Language:
https://bugzilla.suse.com/1171420
https://bugzilla.suse.com/1179599
https://bugzilla.suse.com/1190025
https://bugzilla.suse.com/1191580
https://bugzilla.suse.com/1193157
https://bugzilla.suse.com/1193669
https://bugzilla.suse.com/1193867
https://bugzilla.suse.com/1194272
https://bugzilla.suse.com/1195109
https://bugzilla.suse.com/1195543
https://bugzilla.suse.com/1195908
https://bugzilla.suse.com/1196079
https://bugzilla.suse.com/1196612
https://www.suse.com/security/cve/CVE-2019-0136
https://www.suse.com/security/cve/CVE-2020-12770
https://www.suse.com/security/cve/CVE-2020-27820
https://www.suse.com/security/cve/CVE-2021-3753
https://www.suse.com/security/cve/CVE-2021-4155
https://www.suse.com/security/cve/CVE-2021-45095
https://www.suse.com/security/cve/CVE-2022-0001
https://www.suse.com/security/cve/CVE-2022-0002
https://www.suse.com/security/cve/CVE-2022-0492
Severity: High
ID: 158749
File Name: suse_SU-2022-14905-1.nasl
Version: 1.8
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/9/2022
Updated: 12/7/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 8.4
Risk Factor: Medium
Base Score: 6.9
Temporal Score: 5.7
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-0492
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.2
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-pae, p-cpe:/a:novell:suse_linux:kernel-ec2, p-cpe:/a:novell:suse_linux:kernel-xen-devel, p-cpe:/a:novell:suse_linux:kernel-xen-base, p-cpe:/a:novell:suse_linux:kernel-pae-base, p-cpe:/a:novell:suse_linux:kernel-bigmem, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-trace-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:kernel-ec2-base, p-cpe:/a:novell:suse_linux:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-trace, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-ppc64, p-cpe:/a:novell:suse_linux:kernel-bigmem-devel, p-cpe:/a:novell:suse_linux:kernel-xen, p-cpe:/a:novell:suse_linux:kernel-ppc64-base, p-cpe:/a:novell:suse_linux:kernel-trace-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-bigmem-base, p-cpe:/a:novell:suse_linux:kernel-pae-devel, p-cpe:/a:novell:suse_linux:kernel-ppc64-devel
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/8/2022
Vulnerability Publication Date: 6/11/2019
Metasploit (Docker cgroups Container Escape)
CVE: CVE-2019-0136, CVE-2020-12770, CVE-2020-27820, CVE-2021-3753, CVE-2021-4155, CVE-2021-45095, CVE-2022-0001, CVE-2022-0002, CVE-2022-0492, CVE-2022-0617
SuSE: SUSE-SU-2022:14905-1