Language:
https://bugzilla.suse.com/1179639
https://bugzilla.suse.com/1189126
https://bugzilla.suse.com/1189562
https://bugzilla.suse.com/1193731
https://bugzilla.suse.com/1194516
https://bugzilla.suse.com/1194943
https://bugzilla.suse.com/1195051
https://bugzilla.suse.com/1195254
https://bugzilla.suse.com/1195286
https://bugzilla.suse.com/1195353
https://bugzilla.suse.com/1195403
https://bugzilla.suse.com/1195516
https://bugzilla.suse.com/1195543
https://bugzilla.suse.com/1195612
https://bugzilla.suse.com/1195897
https://bugzilla.suse.com/1195905
https://bugzilla.suse.com/1195939
https://bugzilla.suse.com/1195987
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1196079
https://bugzilla.suse.com/1196095
https://bugzilla.suse.com/1196155
https://bugzilla.suse.com/1196196
https://bugzilla.suse.com/1196235
https://bugzilla.suse.com/1196468
https://bugzilla.suse.com/1196488
https://bugzilla.suse.com/1196612
https://bugzilla.suse.com/1196761
https://bugzilla.suse.com/1196776
https://bugzilla.suse.com/1196823
https://bugzilla.suse.com/1196830
https://bugzilla.suse.com/1196836
https://bugzilla.suse.com/1196956
https://bugzilla.suse.com/1197227
https://bugzilla.suse.com/1197331
https://bugzilla.suse.com/1197366
https://bugzilla.suse.com/1197389
https://bugzilla.suse.com/1197462
https://bugzilla.suse.com/1197702
https://bugzilla.suse.com/1198031
https://bugzilla.suse.com/1198032
https://bugzilla.suse.com/1198033
https://www.suse.com/security/cve/CVE-2021-0920
https://www.suse.com/security/cve/CVE-2021-39698
https://www.suse.com/security/cve/CVE-2021-44879
https://www.suse.com/security/cve/CVE-2021-45868
https://www.suse.com/security/cve/CVE-2022-0487
https://www.suse.com/security/cve/CVE-2022-0492
https://www.suse.com/security/cve/CVE-2022-0516
https://www.suse.com/security/cve/CVE-2022-0617
https://www.suse.com/security/cve/CVE-2022-0644
https://www.suse.com/security/cve/CVE-2022-0850
https://www.suse.com/security/cve/CVE-2022-0854
https://www.suse.com/security/cve/CVE-2022-1016
https://www.suse.com/security/cve/CVE-2022-1048
https://www.suse.com/security/cve/CVE-2022-1055
https://www.suse.com/security/cve/CVE-2022-23036
https://www.suse.com/security/cve/CVE-2022-23037
https://www.suse.com/security/cve/CVE-2022-23038
https://www.suse.com/security/cve/CVE-2022-23039
https://www.suse.com/security/cve/CVE-2022-23040
https://www.suse.com/security/cve/CVE-2022-23041
https://www.suse.com/security/cve/CVE-2022-23042
https://www.suse.com/security/cve/CVE-2022-24448
https://www.suse.com/security/cve/CVE-2022-24958
https://www.suse.com/security/cve/CVE-2022-24959
https://www.suse.com/security/cve/CVE-2022-25258
https://www.suse.com/security/cve/CVE-2022-25375
https://www.suse.com/security/cve/CVE-2022-26490
https://www.suse.com/security/cve/CVE-2022-26966
https://www.suse.com/security/cve/CVE-2022-27666
https://www.suse.com/security/cve/CVE-2022-28388
https://www.suse.com/security/cve/CVE-2022-28389
https://www.suse.com/security/cve/CVE-2022-28390
Severity: High
ID: 159931
File Name: suse_SU-2022-1257-1.nasl
Version: 1.11
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 4/20/2022
Updated: 12/7/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: High
Score: 8.4
Risk Factor: High
Base Score: 7.2
Temporal Score: 6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-39698
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.2
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2022-28390
CPE: p-cpe:/a:novell:suse_linux:dlm-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-rt-devel, p-cpe:/a:novell:suse_linux:kernel-source-rt, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-syms-rt, p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-rt_debug, p-cpe:/a:novell:suse_linux:kernel-rt, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-devel-rt
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/19/2022
Vulnerability Publication Date: 12/15/2021
CISA Known Exploited Vulnerability Due Dates: 6/13/2022
CANVAS (CANVAS)
Metasploit (Docker cgroups Container Escape)
CVE: CVE-2021-0920, CVE-2021-39698, CVE-2021-44879, CVE-2021-45868, CVE-2022-0487, CVE-2022-0492, CVE-2022-0516, CVE-2022-0617, CVE-2022-0644, CVE-2022-0850, CVE-2022-0854, CVE-2022-1016, CVE-2022-1048, CVE-2022-1055, CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042, CVE-2022-24448, CVE-2022-24958, CVE-2022-24959, CVE-2022-25258, CVE-2022-25375, CVE-2022-26490, CVE-2022-26966, CVE-2022-27666, CVE-2022-28388, CVE-2022-28389, CVE-2022-28390, CVE-2022-28748
SuSE: SUSE-SU-2022:1257-1