https://errata.rockylinux.org/RLSA-2022:5313
https://bugzilla.redhat.com/show_bug.cgi?id=2077541
https://bugzilla.redhat.com/show_bug.cgi?id=2077547
Severity: High
ID: 162849
File Name: rocky_linux_RLSA-2022-5313.nasl
Version: 1.6
Type: local
Published: 7/8/2022
Updated: 11/6/2023
Supported Sensors: Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.0
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 4.5
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N
CVSS Score Source: CVE-2022-22576
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:libcurl-devel, p-cpe:/a:rocky:linux:libcurl, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:libcurl-debuginfo, p-cpe:/a:rocky:linux:curl, p-cpe:/a:rocky:linux:libcurl-minimal-debuginfo, p-cpe:/a:rocky:linux:curl-debugsource, p-cpe:/a:rocky:linux:curl-debuginfo, p-cpe:/a:rocky:linux:libcurl-minimal
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/7/2022
Vulnerability Publication Date: 4/28/2022
CVE: CVE-2022-22576, CVE-2022-27774, CVE-2022-27776, CVE-2022-27782
IAVA: 2022-A-0224-S