vulnerability

Amazon Linux AMI 2: CVE-2022-1966: Security patch for kernel, kernel-livepatch-5.10.109-104.500, kernel-livepatch-5.10.112-108.499, kernel-livepatch-5.10.118-111.515 (Multiple Advisories)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 30, 2022
Added
Sep 30, 2022
Modified
Feb 19, 2025

Description

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

Solutions

amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-285-215-501amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-109-104-500amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-109-104-500-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-112-108-499amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-112-108-499-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-118-111-515amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-118-111-515-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-126-117-518amazon-linux-ami-2-upgrade-kernel-livepatch-5-15-50-23-125amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.