Language:
https://bugzilla.suse.com/1028340
https://bugzilla.suse.com/1055710
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1084513
https://bugzilla.suse.com/1087082
https://bugzilla.suse.com/1114648
https://bugzilla.suse.com/1158266
https://bugzilla.suse.com/1172456
https://bugzilla.suse.com/1177282
https://bugzilla.suse.com/1182171
https://bugzilla.suse.com/1183723
https://bugzilla.suse.com/1187055
https://bugzilla.suse.com/1191647
https://bugzilla.suse.com/1191958
https://bugzilla.suse.com/1195065
https://bugzilla.suse.com/1195651
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1196367
https://bugzilla.suse.com/1196426
https://bugzilla.suse.com/1196999
https://bugzilla.suse.com/1197219
https://bugzilla.suse.com/1197343
https://bugzilla.suse.com/1197663
https://bugzilla.suse.com/1198400
https://bugzilla.suse.com/1198516
https://bugzilla.suse.com/1198577
https://bugzilla.suse.com/1198660
https://bugzilla.suse.com/1198687
https://bugzilla.suse.com/1198742
https://bugzilla.suse.com/1198777
https://bugzilla.suse.com/1198825
https://bugzilla.suse.com/1199012
https://bugzilla.suse.com/1199063
https://bugzilla.suse.com/1199314
https://bugzilla.suse.com/1199399
https://bugzilla.suse.com/1199426
https://bugzilla.suse.com/1199505
https://bugzilla.suse.com/1199507
https://bugzilla.suse.com/1199605
https://bugzilla.suse.com/1199650
https://bugzilla.suse.com/1200143
https://bugzilla.suse.com/1200144
https://bugzilla.suse.com/1200249
https://www.suse.com/security/cve/CVE-2017-13695
https://www.suse.com/security/cve/CVE-2018-7755
https://www.suse.com/security/cve/CVE-2019-19377
https://www.suse.com/security/cve/CVE-2019-20811
https://www.suse.com/security/cve/CVE-2020-26541
https://www.suse.com/security/cve/CVE-2021-20292
https://www.suse.com/security/cve/CVE-2021-20321
https://www.suse.com/security/cve/CVE-2021-33061
https://www.suse.com/security/cve/CVE-2021-38208
https://www.suse.com/security/cve/CVE-2021-39711
https://www.suse.com/security/cve/CVE-2021-43389
https://www.suse.com/security/cve/CVE-2022-1011
https://www.suse.com/security/cve/CVE-2022-1184
https://www.suse.com/security/cve/CVE-2022-1353
https://www.suse.com/security/cve/CVE-2022-1419
https://www.suse.com/security/cve/CVE-2022-1516
https://www.suse.com/security/cve/CVE-2022-1652
https://www.suse.com/security/cve/CVE-2022-1729
https://www.suse.com/security/cve/CVE-2022-1734
https://www.suse.com/security/cve/CVE-2022-1974
https://www.suse.com/security/cve/CVE-2022-1975
https://www.suse.com/security/cve/CVE-2022-21123
https://www.suse.com/security/cve/CVE-2022-21125
https://www.suse.com/security/cve/CVE-2022-21127
https://www.suse.com/security/cve/CVE-2022-21166
https://www.suse.com/security/cve/CVE-2022-21180
https://www.suse.com/security/cve/CVE-2022-21499
https://www.suse.com/security/cve/CVE-2022-22942
https://www.suse.com/security/cve/CVE-2022-28748
Severity: High
ID: 162399
File Name: suse_SU-2022-2111-1.nasl
Version: 1.10
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/18/2022
Updated: 7/13/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-1652
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2022-30594
CPE: p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-4_12_14-150100_197_114-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-man
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/17/2022
Vulnerability Publication Date: 8/25/2017
Metasploit (vmwgfx Driver File Descriptor Handling Priv Esc)
CVE: CVE-2017-13695, CVE-2018-7755, CVE-2019-19377, CVE-2019-20811, CVE-2020-26541, CVE-2021-20292, CVE-2021-20321, CVE-2021-33061, CVE-2021-38208, CVE-2021-39711, CVE-2021-43389, CVE-2022-1011, CVE-2022-1184, CVE-2022-1353, CVE-2022-1419, CVE-2022-1516, CVE-2022-1652, CVE-2022-1729, CVE-2022-1734, CVE-2022-1974, CVE-2022-1975, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166, CVE-2022-21180, CVE-2022-21499, CVE-2022-22942, CVE-2022-28748, CVE-2022-30594
SuSE: SUSE-SU-2022:2111-1