语言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-018.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-33655.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2318.html
https://alas.aws.amazon.com/cve/html/CVE-2022-26365.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33740.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33741.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33743.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33744.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49657.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49658.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49663.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49664.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49667.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49670.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49671.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49672.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49673.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49674.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49675.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49687.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49688.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49691.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49695.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49696.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49697.html
严重性: High
ID: 163382
文件名: al2_ALASKERNEL-5_10-2022-018.nasl
版本: 1.14
类型: local
代理: unix
发布时间: 2022/7/22
最近更新时间: 2025/5/23
支持的传感器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
风险因素: Critical
分数: 9.6
风险因素: High
基本分数: 7.2
时间分数: 6.3
矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2022-34918
风险因素: High
基本分数: 7.8
时间分数: 7.5
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.130-118.517, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-tools
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2022/7/19
漏洞发布日期: 2022/7/4
Core Impact
Metasploit (Netfilter nft_set_elem_init Heap Overflow Privilege Escalation)
CVE: CVE-2021-33655, CVE-2022-2318, CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742, CVE-2022-33743, CVE-2022-33744, CVE-2022-34918, CVE-2022-49657, CVE-2022-49658, CVE-2022-49663, CVE-2022-49664, CVE-2022-49667, CVE-2022-49670, CVE-2022-49671, CVE-2022-49672, CVE-2022-49673, CVE-2022-49674, CVE-2022-49675, CVE-2022-49687, CVE-2022-49688, CVE-2022-49691, CVE-2022-49695, CVE-2022-49696, CVE-2022-49697, CVE-2022-49698, CVE-2022-49700