语言:
https://alas.aws.amazon.com//AL2/ALAS2KERNEL-5.15-2023-015.html
https://alas.aws.amazon.com/faqs.html
https://explore.alas.aws.amazon.com/CVE-2022-2196.html
https://explore.alas.aws.amazon.com/CVE-2022-27672.html
https://explore.alas.aws.amazon.com/CVE-2022-50001.html
https://explore.alas.aws.amazon.com/CVE-2022-50556.html
https://explore.alas.aws.amazon.com/CVE-2023-0458.html
https://explore.alas.aws.amazon.com/CVE-2023-1076.html
https://explore.alas.aws.amazon.com/CVE-2023-1077.html
https://explore.alas.aws.amazon.com/CVE-2023-1078.html
https://explore.alas.aws.amazon.com/CVE-2023-1281.html
https://explore.alas.aws.amazon.com/CVE-2023-1829.html
https://explore.alas.aws.amazon.com/CVE-2023-1872.html
https://explore.alas.aws.amazon.com/CVE-2023-1998.html
https://explore.alas.aws.amazon.com/CVE-2023-26545.html
https://explore.alas.aws.amazon.com/CVE-2023-2985.html
https://explore.alas.aws.amazon.com/CVE-2023-45863.html
https://explore.alas.aws.amazon.com/CVE-2023-52646.html
https://explore.alas.aws.amazon.com/CVE-2023-52702.html
https://explore.alas.aws.amazon.com/CVE-2023-52707.html
https://explore.alas.aws.amazon.com/CVE-2023-52735.html
https://explore.alas.aws.amazon.com/CVE-2023-52739.html
https://explore.alas.aws.amazon.com/CVE-2023-52741.html
https://explore.alas.aws.amazon.com/CVE-2023-52746.html
https://explore.alas.aws.amazon.com/CVE-2023-53171.html
https://explore.alas.aws.amazon.com/CVE-2023-53197.html
https://explore.alas.aws.amazon.com/CVE-2023-53200.html
https://explore.alas.aws.amazon.com/CVE-2023-53202.html
https://explore.alas.aws.amazon.com/CVE-2023-53224.html
https://explore.alas.aws.amazon.com/CVE-2023-53234.html
https://explore.alas.aws.amazon.com/CVE-2023-53250.html
https://explore.alas.aws.amazon.com/CVE-2023-53259.html
https://explore.alas.aws.amazon.com/CVE-2023-53279.html
https://explore.alas.aws.amazon.com/CVE-2023-53295.html
https://explore.alas.aws.amazon.com/CVE-2023-53307.html
https://explore.alas.aws.amazon.com/CVE-2023-53359.html
https://explore.alas.aws.amazon.com/CVE-2023-53373.html
https://explore.alas.aws.amazon.com/CVE-2023-53390.html
https://explore.alas.aws.amazon.com/CVE-2023-53408.html
https://explore.alas.aws.amazon.com/CVE-2023-53409.html
https://explore.alas.aws.amazon.com/CVE-2023-53411.html
https://explore.alas.aws.amazon.com/CVE-2023-53423.html
https://explore.alas.aws.amazon.com/CVE-2023-53427.html
https://explore.alas.aws.amazon.com/CVE-2023-53477.html
https://explore.alas.aws.amazon.com/CVE-2023-53482.html
https://explore.alas.aws.amazon.com/CVE-2023-53494.html
https://explore.alas.aws.amazon.com/CVE-2023-53506.html
https://explore.alas.aws.amazon.com/CVE-2023-53590.html
https://explore.alas.aws.amazon.com/CVE-2023-53594.html
https://explore.alas.aws.amazon.com/CVE-2023-53610.html
https://explore.alas.aws.amazon.com/CVE-2023-53695.html
严重性: High
ID: 173235
文件名: al2_ALASKERNEL-5_15-2023-015.nasl
版本: 1.29
类型: local
代理: unix
发布时间: 2023/3/22
最近更新时间: 2025/11/6
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: High
分数: 7.3
风险因素: Medium
基本分数: 6.8
时间分数: 5.3
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2023-52741
风险因素: High
基本分数: 8.8
时间分数: 7.9
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:P/RL:O/RC:C
CVSS 分数来源: CVE-2022-2196
CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.102-61.139, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2023/3/17
漏洞发布日期: 2023/1/9
CVE: CVE-2022-2196, CVE-2022-27672, CVE-2022-50001, CVE-2022-50556, CVE-2023-0458, CVE-2023-1076, CVE-2023-1077, CVE-2023-1078, CVE-2023-1281, CVE-2023-1829, CVE-2023-1872, CVE-2023-1998, CVE-2023-26545, CVE-2023-2985, CVE-2023-45863, CVE-2023-52646, CVE-2023-52702, CVE-2023-52707, CVE-2023-52735, CVE-2023-52739, CVE-2023-52741, CVE-2023-52746, CVE-2023-53171, CVE-2023-53197, CVE-2023-53200, CVE-2023-53202, CVE-2023-53224, CVE-2023-53234, CVE-2023-53250, CVE-2023-53259, CVE-2023-53279, CVE-2023-53295, CVE-2023-53307, CVE-2023-53359, CVE-2023-53373, CVE-2023-53390, CVE-2023-53408, CVE-2023-53409, CVE-2023-53411, CVE-2023-53423, CVE-2023-53427, CVE-2023-53477, CVE-2023-53482, CVE-2023-53494, CVE-2023-53506, CVE-2023-53590, CVE-2023-53594, CVE-2023-53610, CVE-2023-53695, CVE-2023-53709, CVE-2023-7192