Language:
http://www.nessus.org/u?7b3ae77c
https://access.redhat.com/errata/RHSA-2022:5759
https://bugzilla.redhat.com/show_bug.cgi?id=2049302
https://bugzilla.redhat.com/show_bug.cgi?id=2050017
https://bugzilla.redhat.com/show_bug.cgi?id=2050022
https://bugzilla.redhat.com/show_bug.cgi?id=2050024
https://bugzilla.redhat.com/show_bug.cgi?id=2050026
https://bugzilla.redhat.com/show_bug.cgi?id=2050032
https://bugzilla.redhat.com/show_bug.cgi?id=2050034
https://bugzilla.redhat.com/show_bug.cgi?id=2068211
https://bugzilla.redhat.com/show_bug.cgi?id=2068233
https://bugzilla.redhat.com/show_bug.cgi?id=2068234
https://bugzilla.redhat.com/show_bug.cgi?id=2069833
https://bugzilla.redhat.com/show_bug.cgi?id=2074817
https://bugzilla.redhat.com/show_bug.cgi?id=2074947
https://bugzilla.redhat.com/show_bug.cgi?id=2074949
https://bugzilla.redhat.com/show_bug.cgi?id=2074951
https://bugzilla.redhat.com/show_bug.cgi?id=2074966
https://bugzilla.redhat.com/show_bug.cgi?id=2074981
https://bugzilla.redhat.com/show_bug.cgi?id=2074987
https://bugzilla.redhat.com/show_bug.cgi?id=2074996
https://bugzilla.redhat.com/show_bug.cgi?id=2074999
https://bugzilla.redhat.com/show_bug.cgi?id=2075005
https://bugzilla.redhat.com/show_bug.cgi?id=2075006
https://bugzilla.redhat.com/show_bug.cgi?id=2075691
https://bugzilla.redhat.com/show_bug.cgi?id=2075692
https://bugzilla.redhat.com/show_bug.cgi?id=2075693
https://bugzilla.redhat.com/show_bug.cgi?id=2075694
https://bugzilla.redhat.com/show_bug.cgi?id=2075695
https://bugzilla.redhat.com/show_bug.cgi?id=2075696
https://bugzilla.redhat.com/show_bug.cgi?id=2075697
https://bugzilla.redhat.com/show_bug.cgi?id=2075699
https://bugzilla.redhat.com/show_bug.cgi?id=2075700
https://bugzilla.redhat.com/show_bug.cgi?id=2075701
https://bugzilla.redhat.com/show_bug.cgi?id=2076144
https://bugzilla.redhat.com/show_bug.cgi?id=2076145
https://bugzilla.redhat.com/show_bug.cgi?id=2092354
https://bugzilla.redhat.com/show_bug.cgi?id=2092360
https://bugzilla.redhat.com/show_bug.cgi?id=2101776
https://bugzilla.redhat.com/show_bug.cgi?id=2101777
https://bugzilla.redhat.com/show_bug.cgi?id=2101782
https://bugzilla.redhat.com/show_bug.cgi?id=2101783
https://bugzilla.redhat.com/show_bug.cgi?id=2104425
https://bugzilla.redhat.com/show_bug.cgi?id=2104431
https://bugzilla.redhat.com/show_bug.cgi?id=2104433
https://bugzilla.redhat.com/show_bug.cgi?id=2104434
https://bugzilla.redhat.com/show_bug.cgi?id=2106008
https://access.redhat.com/security/updates/classification/#moderate
Severity: High
ID: 163524
File Name: redhat-RHSA-2022-5759.nasl
Version: 1.10
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 7/28/2022
Updated: 11/7/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-24052
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-connect-engine, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-backup, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-errmsg, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-config, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-server-galera, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-server-utils, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-backup-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-config-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-libs, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-server, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-oqgraph-engine, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-server-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-common, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-gssapi-server, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-server-utils-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-server-galera-syspaths, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-pam, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-syspaths, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-test, p-cpe:/a:redhat:enterprise_linux:rh-mariadb105-mariadb-devel
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/28/2022
Vulnerability Publication Date: 1/29/2022
CVE: CVE-2021-46659, CVE-2021-46661, CVE-2021-46663, CVE-2021-46664, CVE-2021-46665, CVE-2021-46668, CVE-2021-46669, CVE-2022-21595, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052, CVE-2022-27376, CVE-2022-27377, CVE-2022-27378, CVE-2022-27379, CVE-2022-27380, CVE-2022-27381, CVE-2022-27382, CVE-2022-27383, CVE-2022-27384, CVE-2022-27386, CVE-2022-27387, CVE-2022-27444, CVE-2022-27445, CVE-2022-27446, CVE-2022-27447, CVE-2022-27448, CVE-2022-27449, CVE-2022-27451, CVE-2022-27452, CVE-2022-27455, CVE-2022-27456, CVE-2022-27457, CVE-2022-27458, CVE-2022-31622, CVE-2022-31623, CVE-2022-32083, CVE-2022-32085, CVE-2022-32086, CVE-2022-32087, CVE-2022-32088