Language:
https://bugzilla.opensuse.org/show_bug.cgi?id=1172385
https://bugzilla.opensuse.org/show_bug.cgi?id=1173612
https://bugzilla.opensuse.org/show_bug.cgi?id=1176673
https://bugzilla.opensuse.org/show_bug.cgi?id=1176682
https://bugzilla.opensuse.org/show_bug.cgi?id=1176684
https://bugzilla.opensuse.org/show_bug.cgi?id=1178174
https://bugzilla.opensuse.org/show_bug.cgi?id=1178400
https://bugzilla.opensuse.org/show_bug.cgi?id=1178934
https://bugzilla.opensuse.org/show_bug.cgi?id=1179466
https://bugzilla.opensuse.org/show_bug.cgi?id=1179467
https://bugzilla.opensuse.org/show_bug.cgi?id=1179468
https://bugzilla.opensuse.org/show_bug.cgi?id=1179686
https://bugzilla.opensuse.org/show_bug.cgi?id=1181108
https://bugzilla.opensuse.org/show_bug.cgi?id=1182425
https://bugzilla.opensuse.org/show_bug.cgi?id=1182577
Severity: Medium
ID: 149640
File Name: openSUSE-2021-600.nasl
Version: 1.3
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/18/2021
Updated: 1/1/2024
Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.9
Risk Factor: Medium
Base Score: 4.4
Temporal Score: 3.4
Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-25624
Risk Factor: Medium
Base Score: 5
Temporal Score: 4.5
Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:qemu-block-iscsi, p-cpe:/a:novell:opensuse:qemu-seabios, p-cpe:/a:novell:opensuse:qemu-ui-gtk, p-cpe:/a:novell:opensuse:qemu-block-ssh, p-cpe:/a:novell:opensuse:qemu-vgabios, p-cpe:/a:novell:opensuse:qemu-extra-debuginfo, p-cpe:/a:novell:opensuse:qemu-linux-user-debugsource, p-cpe:/a:novell:opensuse:qemu-vhost-user-gpu-debuginfo, p-cpe:/a:novell:opensuse:qemu-ui-spice-app, p-cpe:/a:novell:opensuse:qemu-lang, p-cpe:/a:novell:opensuse:qemu-linux-user-debuginfo, p-cpe:/a:novell:opensuse:qemu-ppc, p-cpe:/a:novell:opensuse:qemu-x86, p-cpe:/a:novell:opensuse:qemu-block-ssh-debuginfo, p-cpe:/a:novell:opensuse:qemu-debugsource, p-cpe:/a:novell:opensuse:qemu-kvm, p-cpe:/a:novell:opensuse:qemu-sgabios, p-cpe:/a:novell:opensuse:qemu-s390-debuginfo, p-cpe:/a:novell:opensuse:qemu-block-rbd-debuginfo, p-cpe:/a:novell:opensuse:qemu-ui-sdl, p-cpe:/a:novell:opensuse:qemu-ui-sdl-debuginfo, p-cpe:/a:novell:opensuse:qemu-ui-spice-app-debuginfo, p-cpe:/a:novell:opensuse:qemu-extra, p-cpe:/a:novell:opensuse:qemu-block-nfs-debuginfo, p-cpe:/a:novell:opensuse:qemu-audio-alsa, p-cpe:/a:novell:opensuse:qemu-block-iscsi-debuginfo, p-cpe:/a:novell:opensuse:qemu-block-curl, p-cpe:/a:novell:opensuse:qemu-block-dmg, p-cpe:/a:novell:opensuse:qemu-arm-debuginfo, p-cpe:/a:novell:opensuse:qemu-block-curl-debuginfo, p-cpe:/a:novell:opensuse:qemu-block-nfs, p-cpe:/a:novell:opensuse:qemu-debuginfo, p-cpe:/a:novell:opensuse:qemu-block-rbd, p-cpe:/a:novell:opensuse:qemu-s390, p-cpe:/a:novell:opensuse:qemu-ui-curses, p-cpe:/a:novell:opensuse:qemu-ui-curses-debuginfo, p-cpe:/a:novell:opensuse:qemu-block-gluster-debuginfo, p-cpe:/a:novell:opensuse:qemu-testsuite, p-cpe:/a:novell:opensuse:qemu-ui-gtk-debuginfo, p-cpe:/a:novell:opensuse:qemu-x86-debuginfo, p-cpe:/a:novell:opensuse:qemu-block-gluster, p-cpe:/a:novell:opensuse:qemu-ipxe, p-cpe:/a:novell:opensuse:qemu-tools, p-cpe:/a:novell:opensuse:qemu-ppc-debuginfo, p-cpe:/a:novell:opensuse:qemu-tools-debuginfo, p-cpe:/a:novell:opensuse:qemu-linux-user, p-cpe:/a:novell:opensuse:qemu-arm, p-cpe:/a:novell:opensuse:qemu-audio-pa-debuginfo, p-cpe:/a:novell:opensuse:qemu-audio-alsa-debuginfo, p-cpe:/a:novell:opensuse:qemu-guest-agent-debuginfo, p-cpe:/a:novell:opensuse:qemu-ksm, p-cpe:/a:novell:opensuse:qemu-microvm, p-cpe:/a:novell:opensuse:qemu-vhost-user-gpu, p-cpe:/a:novell:opensuse:qemu-audio-sdl, cpe:/o:novell:opensuse:15.2, p-cpe:/a:novell:opensuse:qemu-audio-sdl-debuginfo, p-cpe:/a:novell:opensuse:qemu-audio-pa, p-cpe:/a:novell:opensuse:qemu, p-cpe:/a:novell:opensuse:qemu-block-dmg-debuginfo, p-cpe:/a:novell:opensuse:qemu-guest-agent
Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/23/2021
Vulnerability Publication Date: 7/2/2020
CVE: CVE-2020-12829, CVE-2020-15469, CVE-2020-25084, CVE-2020-25624, CVE-2020-25625, CVE-2020-25723, CVE-2020-27616, CVE-2020-27617, CVE-2020-27821, CVE-2020-28916, CVE-2020-29129, CVE-2020-29130, CVE-2020-29443, CVE-2021-20257, CVE-2021-3416