Language:
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1114648
https://bugzilla.suse.com/1180153
https://bugzilla.suse.com/1184207
https://bugzilla.suse.com/1189562
https://bugzilla.suse.com/1191428
https://bugzilla.suse.com/1191451
https://bugzilla.suse.com/1191580
https://bugzilla.suse.com/1194943
https://bugzilla.suse.com/1195051
https://bugzilla.suse.com/1195353
https://bugzilla.suse.com/1195403
https://bugzilla.suse.com/1195480
https://bugzilla.suse.com/1195482
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1196114
https://bugzilla.suse.com/1196339
https://bugzilla.suse.com/1196367
https://bugzilla.suse.com/1197894
https://bugzilla.suse.com/1197914
https://bugzilla.suse.com/1198031
https://bugzilla.suse.com/1198032
https://bugzilla.suse.com/1198033
https://www.suse.com/security/cve/CVE-2021-39713
https://www.suse.com/security/cve/CVE-2021-45868
https://www.suse.com/security/cve/CVE-2022-0001
https://www.suse.com/security/cve/CVE-2022-0002
https://www.suse.com/security/cve/CVE-2022-0812
https://www.suse.com/security/cve/CVE-2022-0850
https://www.suse.com/security/cve/CVE-2022-1016
https://www.suse.com/security/cve/CVE-2022-1048
https://www.suse.com/security/cve/CVE-2022-23036
https://www.suse.com/security/cve/CVE-2022-23037
https://www.suse.com/security/cve/CVE-2022-23038
https://www.suse.com/security/cve/CVE-2022-23039
https://www.suse.com/security/cve/CVE-2022-23040
https://www.suse.com/security/cve/CVE-2022-23041
https://www.suse.com/security/cve/CVE-2022-23042
https://www.suse.com/security/cve/CVE-2022-23960
https://www.suse.com/security/cve/CVE-2022-26490
https://www.suse.com/security/cve/CVE-2022-26966
https://www.suse.com/security/cve/CVE-2022-27666
https://www.suse.com/security/cve/CVE-2022-28388
https://www.suse.com/security/cve/CVE-2022-28389
https://www.suse.com/security/cve/CVE-2022-28390
https://bugzilla.suse.com/1192273
https://bugzilla.suse.com/1193738
https://bugzilla.suse.com/1194163
https://bugzilla.suse.com/1194541
https://bugzilla.suse.com/1194580
https://bugzilla.suse.com/1194586
https://bugzilla.suse.com/1194590
https://bugzilla.suse.com/1194591
https://bugzilla.suse.com/1196468
https://bugzilla.suse.com/1196478
https://bugzilla.suse.com/1196488
https://bugzilla.suse.com/1196514
https://bugzilla.suse.com/1196639
https://bugzilla.suse.com/1196657
https://bugzilla.suse.com/1196723
https://bugzilla.suse.com/1196761
https://bugzilla.suse.com/1196830
https://bugzilla.suse.com/1196836
https://bugzilla.suse.com/1196901
https://bugzilla.suse.com/1196942
https://bugzilla.suse.com/1196973
https://bugzilla.suse.com/1196999
https://bugzilla.suse.com/1197099
https://bugzilla.suse.com/1197227
https://bugzilla.suse.com/1197331
https://bugzilla.suse.com/1197366
https://bugzilla.suse.com/1197462
https://bugzilla.suse.com/1197531
https://bugzilla.suse.com/1197661
https://bugzilla.suse.com/1197675
https://bugzilla.suse.com/1197754
https://bugzilla.suse.com/1197755
https://bugzilla.suse.com/1197756
https://bugzilla.suse.com/1197757
https://bugzilla.suse.com/1197758
https://bugzilla.suse.com/1197760
https://bugzilla.suse.com/1197763
Severity: High
ID: 159749
File Name: suse_SU-2022-1196-1.nasl
Version: 1.8
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 4/15/2022
Updated: 7/13/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.9
Temporal Score: 5.7
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-1048
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.2
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2022-28390
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_116-default, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-man
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/14/2022
Vulnerability Publication Date: 3/6/2022
CANVAS (CANVAS)
CVE: CVE-2021-39713, CVE-2021-45868, CVE-2022-0001, CVE-2022-0002, CVE-2022-0812, CVE-2022-0850, CVE-2022-1016, CVE-2022-1048, CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042, CVE-2022-23960, CVE-2022-26490, CVE-2022-26966, CVE-2022-27666, CVE-2022-28388, CVE-2022-28389, CVE-2022-28390
SuSE: SUSE-SU-2022:1196-1