Language:
https://bugzilla.suse.com/show_bug.cgi?id=1087082
https://bugzilla.suse.com/show_bug.cgi?id=1087845
https://bugzilla.suse.com/show_bug.cgi?id=1089895
https://bugzilla.suse.com/show_bug.cgi?id=1091755
https://bugzilla.suse.com/show_bug.cgi?id=1092497
https://bugzilla.suse.com/show_bug.cgi?id=1093215
https://bugzilla.suse.com/show_bug.cgi?id=1094019
https://bugzilla.suse.com/show_bug.cgi?id=985025
https://www.suse.com/security/cve/CVE-2018-1000199/
https://www.suse.com/security/cve/CVE-2018-10675/
Severity: High
ID: 110039
File Name: suse_SU-2018-1374-1.nasl
Version: 1.10
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/23/2018
Updated: 10/3/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2018-10675
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-xen-debugsource, p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo, p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_133-xen, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_133-default, p-cpe:/a:novell:suse_linux:kernel-default-man
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/22/2018
Vulnerability Publication Date: 5/2/2018