Language:
https://bugzilla.suse.com/1028340
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1158266
https://bugzilla.suse.com/1177282
https://bugzilla.suse.com/1191647
https://bugzilla.suse.com/1195651
https://bugzilla.suse.com/1195926
https://bugzilla.suse.com/1196114
https://bugzilla.suse.com/1196367
https://bugzilla.suse.com/1196426
https://bugzilla.suse.com/1196433
https://bugzilla.suse.com/1196514
https://bugzilla.suse.com/1196570
https://bugzilla.suse.com/1196942
https://bugzilla.suse.com/1197157
https://bugzilla.suse.com/1197343
https://bugzilla.suse.com/1197472
https://bugzilla.suse.com/1197656
https://bugzilla.suse.com/1197660
https://bugzilla.suse.com/1197895
https://bugzilla.suse.com/1198330
https://bugzilla.suse.com/1198400
https://bugzilla.suse.com/1198484
https://bugzilla.suse.com/1198516
https://bugzilla.suse.com/1198577
https://bugzilla.suse.com/1198660
https://bugzilla.suse.com/1198687
https://bugzilla.suse.com/1198778
https://bugzilla.suse.com/1198825
https://bugzilla.suse.com/1199012
https://bugzilla.suse.com/1199063
https://bugzilla.suse.com/1199314
https://bugzilla.suse.com/1199505
https://bugzilla.suse.com/1199507
https://bugzilla.suse.com/1199605
https://bugzilla.suse.com/1199650
https://bugzilla.suse.com/1199918
https://bugzilla.suse.com/1200015
https://bugzilla.suse.com/1200143
https://bugzilla.suse.com/1200144
https://bugzilla.suse.com/1200249
https://www.suse.com/security/cve/CVE-2019-19377
https://www.suse.com/security/cve/CVE-2020-26541
https://www.suse.com/security/cve/CVE-2021-20321
https://www.suse.com/security/cve/CVE-2021-33061
https://www.suse.com/security/cve/CVE-2022-0168
https://www.suse.com/security/cve/CVE-2022-1011
https://www.suse.com/security/cve/CVE-2022-1158
https://www.suse.com/security/cve/CVE-2022-1184
https://www.suse.com/security/cve/CVE-2022-1353
https://www.suse.com/security/cve/CVE-2022-1516
https://www.suse.com/security/cve/CVE-2022-1652
https://www.suse.com/security/cve/CVE-2022-1729
https://www.suse.com/security/cve/CVE-2022-1734
https://www.suse.com/security/cve/CVE-2022-1974
https://www.suse.com/security/cve/CVE-2022-1975
https://www.suse.com/security/cve/CVE-2022-21123
https://www.suse.com/security/cve/CVE-2022-21125
https://www.suse.com/security/cve/CVE-2022-21127
https://www.suse.com/security/cve/CVE-2022-21166
https://www.suse.com/security/cve/CVE-2022-21180
https://www.suse.com/security/cve/CVE-2022-28893
Severity: High
ID: 162379
File Name: suse_SU-2022-2104-1.nasl
Version: 1.7
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/17/2022
Updated: 1/16/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-28893
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.2
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2022-30594
CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150200_24_115-default, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/16/2022
Vulnerability Publication Date: 11/29/2019
CVE: CVE-2019-19377, CVE-2020-26541, CVE-2021-20321, CVE-2021-33061, CVE-2022-0168, CVE-2022-1011, CVE-2022-1158, CVE-2022-1184, CVE-2022-1353, CVE-2022-1516, CVE-2022-1652, CVE-2022-1729, CVE-2022-1734, CVE-2022-1974, CVE-2022-1975, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166, CVE-2022-21180, CVE-2022-28893, CVE-2022-30594
SuSE: SUSE-SU-2022:2104-1