Language:
https://alas.aws.amazon.com/cve/html/CVE-2022-49205.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49206.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49209.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49220.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49224.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49259.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49279.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49280.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49287.html
https://alas.aws.amazon.com/cve/html/CVE-2023-1637.html
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-076.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47634.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47646.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47650.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1158.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1353.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2977.html
https://alas.aws.amazon.com/cve/html/CVE-2022-41858.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48853.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49044.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49048.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49053.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49058.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49066.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49073.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49074.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49075.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49077.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49078.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49080.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49084.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49085.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49087.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49092.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49094.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49098.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49100.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49114.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49122.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49145.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49155.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49166.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49171.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49175.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49176.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49179.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49180.html
深刻度: High
ID: 206247
ファイル名: al2_ALASKERNEL-5_4-2024-076.nasl
バージョン: 1.11
タイプ: local
エージェント: unix
公開日: 2024/8/28
更新日: 2025/5/23
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Medium
スコア: 6.7
リスクファクター: Low
基本値: 3.6
現状値: 2.8
ベクトル: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS スコアのソース: CVE-2022-1353
リスクファクター: High
基本値: 7.8
現状値: 7
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CVSS スコアのソース: CVE-2022-49058
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2024/7/24
脆弱性公開日: 2022/4/29
CVE: CVE-2021-47634, CVE-2021-47646, CVE-2021-47650, CVE-2022-1158, CVE-2022-1353, CVE-2022-2977, CVE-2022-41858, CVE-2022-48853, CVE-2022-49044, CVE-2022-49048, CVE-2022-49053, CVE-2022-49058, CVE-2022-49066, CVE-2022-49073, CVE-2022-49074, CVE-2022-49075, CVE-2022-49077, CVE-2022-49078, CVE-2022-49080, CVE-2022-49084, CVE-2022-49085, CVE-2022-49087, CVE-2022-49092, CVE-2022-49094, CVE-2022-49098, CVE-2022-49100, CVE-2022-49114, CVE-2022-49122, CVE-2022-49145, CVE-2022-49155, CVE-2022-49166, CVE-2022-49171, CVE-2022-49175, CVE-2022-49176, CVE-2022-49179, CVE-2022-49180, CVE-2022-49197, CVE-2022-49204, CVE-2022-49205, CVE-2022-49206, CVE-2022-49209, CVE-2022-49220, CVE-2022-49224, CVE-2022-49259, CVE-2022-49279, CVE-2022-49280, CVE-2022-49287, CVE-2023-1637