Language:
https://bugzilla.suse.com/1028340
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1137728
https://bugzilla.suse.com/1152472
https://bugzilla.suse.com/1152489
https://bugzilla.suse.com/1177028
https://bugzilla.suse.com/1179878
https://bugzilla.suse.com/1182073
https://bugzilla.suse.com/1183723
https://bugzilla.suse.com/1187055
https://bugzilla.suse.com/1191647
https://bugzilla.suse.com/1193556
https://bugzilla.suse.com/1193842
https://bugzilla.suse.com/1194625
https://bugzilla.suse.com/1195651
https://bugzilla.suse.com/1195926
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1196114
https://bugzilla.suse.com/1196367
https://bugzilla.suse.com/1196514
https://bugzilla.suse.com/1196639
https://bugzilla.suse.com/1196942
https://bugzilla.suse.com/1197157
https://bugzilla.suse.com/1197391
https://bugzilla.suse.com/1197656
https://bugzilla.suse.com/1197660
https://bugzilla.suse.com/1197677
https://bugzilla.suse.com/1197914
https://bugzilla.suse.com/1197926
https://bugzilla.suse.com/1198077
https://bugzilla.suse.com/1198217
https://bugzilla.suse.com/1198330
https://bugzilla.suse.com/1198400
https://bugzilla.suse.com/1198413
https://bugzilla.suse.com/1198437
https://bugzilla.suse.com/1198448
https://bugzilla.suse.com/1198484
https://bugzilla.suse.com/1198515
https://bugzilla.suse.com/1198516
https://bugzilla.suse.com/1198534
https://bugzilla.suse.com/1198742
https://bugzilla.suse.com/1198825
https://bugzilla.suse.com/1198989
https://bugzilla.suse.com/1199012
https://bugzilla.suse.com/1199024
https://www.suse.com/security/cve/CVE-2020-27835
https://www.suse.com/security/cve/CVE-2021-0707
https://www.suse.com/security/cve/CVE-2021-20292
https://www.suse.com/security/cve/CVE-2021-20321
https://www.suse.com/security/cve/CVE-2021-38208
https://www.suse.com/security/cve/CVE-2021-4154
https://www.suse.com/security/cve/CVE-2022-0812
https://www.suse.com/security/cve/CVE-2022-1158
https://www.suse.com/security/cve/CVE-2022-1280
https://www.suse.com/security/cve/CVE-2022-1353
https://www.suse.com/security/cve/CVE-2022-1419
https://www.suse.com/security/cve/CVE-2022-1516
https://www.suse.com/security/cve/CVE-2022-28356
https://www.suse.com/security/cve/CVE-2022-28748
https://www.suse.com/security/cve/CVE-2022-28893
Severity: High
ID: 161235
File Name: suse_SU-2022-1687-1.nasl
Version: 1.8
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/17/2022
Updated: 7/13/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: High
Score: 7.3
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-29156
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.9
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2021-4154
CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150300_59_68-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:kernel-preempt-extra, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, cpe:/o:novell:suse_linux:15
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/16/2022
Vulnerability Publication Date: 1/7/2021
CVE: CVE-2020-27835, CVE-2021-0707, CVE-2021-20292, CVE-2021-20321, CVE-2021-38208, CVE-2021-4154, CVE-2022-0812, CVE-2022-1158, CVE-2022-1280, CVE-2022-1353, CVE-2022-1419, CVE-2022-1516, CVE-2022-28356, CVE-2022-28748, CVE-2022-28893, CVE-2022-29156
SuSE: SUSE-SU-2022:1687-1