Language:
https://bugzilla.suse.com/1152107
https://bugzilla.suse.com/1168952
https://bugzilla.suse.com/1173659
https://bugzilla.suse.com/1173942
https://bugzilla.suse.com/1174205
https://bugzilla.suse.com/1174247
https://bugzilla.suse.com/1174993
https://bugzilla.suse.com/1175691
https://bugzilla.suse.com/1176011
https://bugzilla.suse.com/1176012
https://bugzilla.suse.com/1176235
https://bugzilla.suse.com/1176253
https://bugzilla.suse.com/1176278
https://bugzilla.suse.com/1176395
https://bugzilla.suse.com/1176423
https://bugzilla.suse.com/1176482
https://bugzilla.suse.com/1176485
https://bugzilla.suse.com/1176722
https://bugzilla.suse.com/1176896
https://bugzilla.suse.com/1177206
https://bugzilla.suse.com/1177226
https://bugzilla.suse.com/1177666
https://bugzilla.suse.com/1177766
https://bugzilla.suse.com/1177906
https://bugzilla.suse.com/1178123
https://bugzilla.suse.com/1178182
https://bugzilla.suse.com/1178589
https://bugzilla.suse.com/1178590
https://bugzilla.suse.com/1178622
https://bugzilla.suse.com/1178886
https://bugzilla.suse.com/1179107
https://bugzilla.suse.com/1179140
https://bugzilla.suse.com/1179141
https://bugzilla.suse.com/1179419
https://bugzilla.suse.com/1179601
https://bugzilla.suse.com/1179616
https://bugzilla.suse.com/1179745
https://bugzilla.suse.com/1179877
https://bugzilla.suse.com/1180029
https://bugzilla.suse.com/1180030
https://bugzilla.suse.com/1180052
https://bugzilla.suse.com/1180086
https://bugzilla.suse.com/1180559
https://bugzilla.suse.com/1180562
https://bugzilla.suse.com/1181158
https://bugzilla.suse.com/1181166
https://bugzilla.suse.com/1181349
https://bugzilla.suse.com/1181553
http://www.nessus.org/u?56f42edd
https://www.suse.com/security/cve/CVE-2019-16746
https://www.suse.com/security/cve/CVE-2020-0404
https://www.suse.com/security/cve/CVE-2020-0431
https://www.suse.com/security/cve/CVE-2020-0465
https://www.suse.com/security/cve/CVE-2020-11668
https://www.suse.com/security/cve/CVE-2020-14331
https://www.suse.com/security/cve/CVE-2020-14353
https://www.suse.com/security/cve/CVE-2020-14381
https://www.suse.com/security/cve/CVE-2020-14390
https://www.suse.com/security/cve/CVE-2020-15436
https://www.suse.com/security/cve/CVE-2020-15437
https://www.suse.com/security/cve/CVE-2020-25211
https://www.suse.com/security/cve/CVE-2020-25284
https://www.suse.com/security/cve/CVE-2020-25285
https://www.suse.com/security/cve/CVE-2020-25643
https://www.suse.com/security/cve/CVE-2020-25656
https://www.suse.com/security/cve/CVE-2020-25668
https://www.suse.com/security/cve/CVE-2020-25669
https://www.suse.com/security/cve/CVE-2020-27068
https://www.suse.com/security/cve/CVE-2020-27777
https://www.suse.com/security/cve/CVE-2020-27786
https://www.suse.com/security/cve/CVE-2020-28915
https://www.suse.com/security/cve/CVE-2020-28974
https://www.suse.com/security/cve/CVE-2020-29660
https://www.suse.com/security/cve/CVE-2020-29661
https://www.suse.com/security/cve/CVE-2020-36158
Severity: Critical
ID: 150536
File Name: suse_SU-2021-14630-1.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/10/2021
Updated: 2/9/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-27068
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-bigmem, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-trace-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-ppc64-devel, p-cpe:/a:novell:suse_linux:kernel-ppc64, p-cpe:/a:novell:suse_linux:kernel-bigmem-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-ppc64-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-bigmem-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/16/2021
Vulnerability Publication Date: 9/24/2019
CVE: CVE-2019-16746, CVE-2020-0404, CVE-2020-0431, CVE-2020-0465, CVE-2020-11668, CVE-2020-14331, CVE-2020-14353, CVE-2020-14381, CVE-2020-14390, CVE-2020-15436, CVE-2020-15437, CVE-2020-25211, CVE-2020-25284, CVE-2020-25285, CVE-2020-25643, CVE-2020-25656, CVE-2020-25668, CVE-2020-25669, CVE-2020-27068, CVE-2020-27777, CVE-2020-27786, CVE-2020-28915, CVE-2020-28974, CVE-2020-29660, CVE-2020-29661, CVE-2020-36158, CVE-2020-4788, CVE-2021-3347
SuSE: SUSE-SU-2021:14630-1