Language:
https://bugzilla.suse.com/1196516
https://bugzilla.suse.com/1196584
https://bugzilla.suse.com/1196585
https://bugzilla.suse.com/1196601
https://bugzilla.suse.com/1196612
https://bugzilla.suse.com/1196776
http://www.nessus.org/u?af960ba2
https://www.suse.com/security/cve/CVE-2022-0001
https://www.suse.com/security/cve/CVE-2022-0002
https://www.suse.com/security/cve/CVE-2022-0492
https://www.suse.com/security/cve/CVE-2022-0516
https://www.suse.com/security/cve/CVE-2022-0847
https://www.suse.com/security/cve/CVE-2022-25375
https://bugzilla.suse.com/1089644
https://bugzilla.suse.com/1154353
https://bugzilla.suse.com/1157038
https://bugzilla.suse.com/1157923
https://bugzilla.suse.com/1176447
https://bugzilla.suse.com/1176940
https://bugzilla.suse.com/1178134
https://bugzilla.suse.com/1181147
https://bugzilla.suse.com/1181588
https://bugzilla.suse.com/1183872
https://bugzilla.suse.com/1187716
https://bugzilla.suse.com/1188404
https://bugzilla.suse.com/1189126
https://bugzilla.suse.com/1190812
https://bugzilla.suse.com/1190972
https://bugzilla.suse.com/1191580
https://bugzilla.suse.com/1191655
https://bugzilla.suse.com/1191741
https://bugzilla.suse.com/1192210
https://bugzilla.suse.com/1192483
https://bugzilla.suse.com/1193096
https://bugzilla.suse.com/1193233
https://bugzilla.suse.com/1193243
https://bugzilla.suse.com/1193787
https://bugzilla.suse.com/1194163
https://bugzilla.suse.com/1194967
https://bugzilla.suse.com/1195012
https://bugzilla.suse.com/1195081
https://bugzilla.suse.com/1195286
https://bugzilla.suse.com/1195352
https://bugzilla.suse.com/1195378
https://bugzilla.suse.com/1195506
https://bugzilla.suse.com/1195516
https://bugzilla.suse.com/1195543
https://bugzilla.suse.com/1195668
https://bugzilla.suse.com/1195701
https://bugzilla.suse.com/1195798
https://bugzilla.suse.com/1195799
https://bugzilla.suse.com/1195823
https://bugzilla.suse.com/1195908
https://bugzilla.suse.com/1195928
https://bugzilla.suse.com/1195947
https://bugzilla.suse.com/1195957
https://bugzilla.suse.com/1195995
https://bugzilla.suse.com/1196195
https://bugzilla.suse.com/1196235
https://bugzilla.suse.com/1196339
https://bugzilla.suse.com/1196373
Severity: High
ID: 158777
File Name: openSUSE-2022-0760-1.nasl
Version: 1.8
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/10/2022
Updated: 1/16/2023
Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-0847
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:novell:opensuse:dtb-nvidia, p-cpe:/a:novell:opensuse:dtb-freescale, p-cpe:/a:novell:opensuse:dtb-allwinner, p-cpe:/a:novell:opensuse:dtb-socionext, p-cpe:/a:novell:opensuse:dtb-amd, p-cpe:/a:novell:opensuse:kernel-default-livepatch, p-cpe:/a:novell:opensuse:kselftests-km64kb, p-cpe:/a:novell:opensuse:dtb-exynos, p-cpe:/a:novell:opensuse:gfs2-kmdefault, p-cpe:/a:novell:opensuse:dtb-mediatek, p-cpe:/a:novell:opensuse:dtb-amlogic, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:dtb-arm, p-cpe:/a:novell:opensuse:dlm-kmdefault, p-cpe:/a:novell:opensuse:cluster-md-kmdefault, p-cpe:/a:novell:opensuse:dtb-al, p-cpe:/a:novell:opensuse:dlm-km64kb, p-cpe:/a:novell:opensuse:dtb-altera, p-cpe:/a:novell:opensuse:dtb-qcom, p-cpe:/a:novell:opensuse:dtb-sprd, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-kvmsmall-livepatch-devel, p-cpe:/a:novell:opensuse:kernel-macros, p-cpe:/a:novell:opensuse:kernel-64kb-optional, p-cpe:/a:novell:opensuse:ocfs2-kmpreempt, p-cpe:/a:novell:opensuse:reiserfs-kmpreempt, p-cpe:/a:novell:opensuse:dtb-hisilicon, p-cpe:/a:novell:opensuse:dtb-marvell, p-cpe:/a:novell:opensuse:cluster-md-kmpreempt, p-cpe:/a:novell:opensuse:kernel-kvmsmall, p-cpe:/a:novell:opensuse:kselftests-kmdefault, p-cpe:/a:novell:opensuse:dtb-apm, p-cpe:/a:novell:opensuse:dtb-renesas, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-default-extra, p-cpe:/a:novell:opensuse:kernel-default-livepatch-devel, p-cpe:/a:novell:opensuse:dtb-rockchip, p-cpe:/a:novell:opensuse:kernel-obs-build, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:gfs2-km64kb, p-cpe:/a:novell:opensuse:kernel-64kb-devel, p-cpe:/a:novell:opensuse:kernel-default-base-rebuild, p-cpe:/a:novell:opensuse:kernel-obs-qa, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kselftests-kmpreempt, p-cpe:/a:novell:opensuse:reiserfs-kmdefault, p-cpe:/a:novell:opensuse:kernel-64kb-extra, p-cpe:/a:novell:opensuse:dtb-broadcom, p-cpe:/a:novell:opensuse:dtb-zte, p-cpe:/a:novell:opensuse:kernel-preempt-extra, p-cpe:/a:novell:opensuse:kernel-zfcpdump, p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel, p-cpe:/a:novell:opensuse:dtb-cavium, p-cpe:/a:novell:opensuse:dtb-lg, p-cpe:/a:novell:opensuse:kernel-debug, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:reiserfs-km64kb, p-cpe:/a:novell:opensuse:kernel-debug-livepatch-devel, p-cpe:/a:novell:opensuse:ocfs2-km64kb, p-cpe:/a:novell:opensuse:dtb-xilinx, p-cpe:/a:novell:opensuse:kernel-64kb, p-cpe:/a:novell:opensuse:ocfs2-kmdefault, p-cpe:/a:novell:opensuse:kernel-default-optional, p-cpe:/a:novell:opensuse:kernel-preempt-optional, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-preempt, p-cpe:/a:novell:opensuse:gfs2-kmpreempt, p-cpe:/a:novell:opensuse:kernel-preempt-livepatch-devel, p-cpe:/a:novell:opensuse:kernel-64kb-livepatch-devel, p-cpe:/a:novell:opensuse:kernel-preempt-devel, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:dlm-kmpreempt, p-cpe:/a:novell:opensuse:cluster-md-km64kb
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/8/2022
Vulnerability Publication Date: 2/20/2022
CISA Known Exploited Vulnerability Due Dates: 5/16/2022
CANVAS (CANVAS)
Core Impact
Metasploit (Dirty Pipe Local Privilege Escalation via CVE-2022-0847)
CVE: CVE-2022-0001, CVE-2022-0002, CVE-2022-0492, CVE-2022-0516, CVE-2022-0847, CVE-2022-25375