语言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-010.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47619.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0330.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0492.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48747.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48748.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48754.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48757.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48760.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48761.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48767.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48769.html
严重性: High
ID: 160428
文件名: al2_ALASKERNEL-5_10-2022-010.nasl
版本: 1.8
类型: local
代理: unix
发布时间: 2022/5/2
最近更新时间: 2024/12/17
支持的传感器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
风险因素: High
分数: 8.4
风险因素: Medium
基本分数: 6.9
时间分数: 5.7
矢量: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2022-0492
风险因素: High
基本分数: 7.8
时间分数: 7.2
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.96-90.460, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2022/2/5
漏洞发布日期: 2022/2/4
Metasploit (Docker cgroups Container Escape)
CVE: CVE-2021-47619, CVE-2022-0330, CVE-2022-0492, CVE-2022-48747, CVE-2022-48748, CVE-2022-48754, CVE-2022-48757, CVE-2022-48760, CVE-2022-48761, CVE-2022-48767, CVE-2022-48769, CVE-2022-48770