Language:
https://bugzilla.suse.com/show_bug.cgi?id=1165629
https://bugzilla.suse.com/show_bug.cgi?id=1173485
https://bugzilla.suse.com/show_bug.cgi?id=1176720
https://bugzilla.suse.com/show_bug.cgi?id=1178181
https://bugzilla.suse.com/show_bug.cgi?id=1182715
https://bugzilla.suse.com/show_bug.cgi?id=1182716
https://bugzilla.suse.com/show_bug.cgi?id=1182717
https://bugzilla.suse.com/show_bug.cgi?id=1183022
https://bugzilla.suse.com/show_bug.cgi?id=1183069
https://bugzilla.suse.com/show_bug.cgi?id=1183593
https://bugzilla.suse.com/show_bug.cgi?id=1184120
https://bugzilla.suse.com/show_bug.cgi?id=1184167
https://bugzilla.suse.com/show_bug.cgi?id=1184168
https://bugzilla.suse.com/show_bug.cgi?id=1184194
https://www.suse.com/security/cve/CVE-2021-27364/
https://www.suse.com/security/cve/CVE-2021-27365/
https://www.suse.com/security/cve/CVE-2021-28038/
https://www.suse.com/security/cve/CVE-2021-28660/
https://www.suse.com/security/cve/CVE-2021-28950/
https://www.suse.com/security/cve/CVE-2021-28972/
https://www.suse.com/security/cve/CVE-2021-29154/
https://www.suse.com/security/cve/CVE-2021-29264/
https://www.suse.com/security/cve/CVE-2021-29265/
https://www.suse.com/security/cve/CVE-2021-29650/
https://www.suse.com/security/cve/CVE-2021-30002/
https://www.suse.com/security/cve/CVE-2021-3483/
http://www.nessus.org/u?ee23a22f
https://bugzilla.suse.com/show_bug.cgi?id=1184198
https://bugzilla.suse.com/show_bug.cgi?id=1184208
https://bugzilla.suse.com/show_bug.cgi?id=1184211
https://bugzilla.suse.com/show_bug.cgi?id=1184391
https://bugzilla.suse.com/show_bug.cgi?id=1184393
https://bugzilla.suse.com/show_bug.cgi?id=1184397
https://bugzilla.suse.com/show_bug.cgi?id=1184509
https://bugzilla.suse.com/show_bug.cgi?id=1184611
https://bugzilla.suse.com/show_bug.cgi?id=1184952
https://bugzilla.suse.com/show_bug.cgi?id=1185555
https://bugzilla.suse.com/show_bug.cgi?id=1185556
https://bugzilla.suse.com/show_bug.cgi?id=1185557
https://www.suse.com/security/cve/CVE-2020-0433/
https://www.suse.com/security/cve/CVE-2020-1749/
https://www.suse.com/security/cve/CVE-2020-25670/
https://www.suse.com/security/cve/CVE-2020-25671/
https://www.suse.com/security/cve/CVE-2020-25672/
https://www.suse.com/security/cve/CVE-2020-25673/
https://www.suse.com/security/cve/CVE-2020-36312/
https://www.suse.com/security/cve/CVE-2020-36322/
Severity: High
ID: 149633
File Name: suse_SU-2021-1617-1.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/18/2021
Updated: 1/1/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 8.3
Temporal Score: 6.5
Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-28660
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.9
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-debuginfo, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-debugsource, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/17/2021
Vulnerability Publication Date: 9/9/2020
CVE: CVE-2020-0433, CVE-2020-1749, CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2020-36312, CVE-2020-36322, CVE-2021-20219, CVE-2021-26931, CVE-2021-27363, CVE-2021-27364, CVE-2021-27365, CVE-2021-28038, CVE-2021-28660, CVE-2021-28950, CVE-2021-28972, CVE-2021-29154, CVE-2021-29264, CVE-2021-29265, CVE-2021-29650, CVE-2021-30002, CVE-2021-3483