Language:
https://bugzilla.suse.com/1107207
https://bugzilla.suse.com/1114893
https://bugzilla.suse.com/1185973
https://bugzilla.suse.com/1191580
https://bugzilla.suse.com/1194516
https://bugzilla.suse.com/1195536
https://bugzilla.suse.com/1195543
https://bugzilla.suse.com/1195612
https://bugzilla.suse.com/1195840
https://bugzilla.suse.com/1195897
https://bugzilla.suse.com/1195908
https://bugzilla.suse.com/1195934
https://bugzilla.suse.com/1195949
https://bugzilla.suse.com/1195987
https://bugzilla.suse.com/1196079
https://bugzilla.suse.com/1196155
https://bugzilla.suse.com/1196584
https://bugzilla.suse.com/1196601
https://bugzilla.suse.com/1196612
https://www.suse.com/security/cve/CVE-2021-44879
https://www.suse.com/security/cve/CVE-2022-0001
https://www.suse.com/security/cve/CVE-2022-0002
https://www.suse.com/security/cve/CVE-2022-0487
https://www.suse.com/security/cve/CVE-2022-0492
https://www.suse.com/security/cve/CVE-2022-0617
https://www.suse.com/security/cve/CVE-2022-0644
https://www.suse.com/security/cve/CVE-2022-0847
https://www.suse.com/security/cve/CVE-2022-24448
Severity: High
ID: 158758
File Name: suse_SU-2022-0757-1.nasl
Version: 1.13
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/9/2022
Updated: 7/14/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-0847
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-95_93-default, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-default-man
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/8/2022
Vulnerability Publication Date: 2/4/2022
CISA Known Exploited Vulnerability Due Dates: 5/16/2022
CANVAS (CANVAS)
Core Impact
Metasploit (Dirty Pipe Local Privilege Escalation via CVE-2022-0847)
CVE: CVE-2021-44879, CVE-2022-0001, CVE-2022-0002, CVE-2022-0487, CVE-2022-0492, CVE-2022-0617, CVE-2022-0644, CVE-2022-0847, CVE-2022-24448, CVE-2022-24959
SuSE: SUSE-SU-2022:0757-1