Language:
https://bugzilla.suse.com/1056134
https://bugzilla.suse.com/1180963
https://bugzilla.suse.com/1182715
https://bugzilla.suse.com/1182716
https://bugzilla.suse.com/1182717
https://bugzilla.suse.com/1183400
https://bugzilla.suse.com/1183696
https://bugzilla.suse.com/1184120
https://bugzilla.suse.com/1184194
https://bugzilla.suse.com/1184198
https://bugzilla.suse.com/1184208
https://bugzilla.suse.com/1184211
https://bugzilla.suse.com/1184393
http://www.nessus.org/u?39f73de8
https://www.suse.com/security/cve/CVE-2020-35519
https://www.suse.com/security/cve/CVE-2020-36322
https://www.suse.com/security/cve/CVE-2021-20261
https://www.suse.com/security/cve/CVE-2021-27363
https://www.suse.com/security/cve/CVE-2021-27364
https://www.suse.com/security/cve/CVE-2021-27365
https://www.suse.com/security/cve/CVE-2021-28950
https://www.suse.com/security/cve/CVE-2021-28972
https://www.suse.com/security/cve/CVE-2021-29650
Severity: High
ID: 150550
File Name: suse_SU-2021-14724-1.nasl
Version: 1.4
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/10/2021
Updated: 12/26/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-28972
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2021-3483
CPE: p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-bigmem, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-trace-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-ppc64, p-cpe:/a:novell:suse_linux:kernel-bigmem-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-ppc64-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-bigmem-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-ppc64-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/12/2021
Vulnerability Publication Date: 3/7/2021
CVE: CVE-2020-35519, CVE-2020-36322, CVE-2021-20261, CVE-2021-27363, CVE-2021-27364, CVE-2021-27365, CVE-2021-28950, CVE-2021-28972, CVE-2021-29650, CVE-2021-30002, CVE-2021-3483
SuSE: SUSE-SU-2021:14724-1