Language:
https://bugzilla.suse.com/1103269
https://bugzilla.suse.com/1114648
https://bugzilla.suse.com/1190812
https://bugzilla.suse.com/1195775
https://bugzilla.suse.com/1195926
https://bugzilla.suse.com/1198484
https://bugzilla.suse.com/1198829
https://bugzilla.suse.com/1200442
https://bugzilla.suse.com/1200598
https://bugzilla.suse.com/1200644
https://bugzilla.suse.com/1200651
https://bugzilla.suse.com/1200910
https://bugzilla.suse.com/1201196
https://bugzilla.suse.com/1201381
https://bugzilla.suse.com/1201429
https://bugzilla.suse.com/1201635
https://bugzilla.suse.com/1201636
https://bugzilla.suse.com/1201644
https://bugzilla.suse.com/1201651
https://bugzilla.suse.com/1201930
https://bugzilla.suse.com/1201940
https://bugzilla.suse.com/1201954
https://bugzilla.suse.com/1201958
https://www.suse.com/security/cve/CVE-2020-36557
https://www.suse.com/security/cve/CVE-2020-36558
https://www.suse.com/security/cve/CVE-2021-33655
https://www.suse.com/security/cve/CVE-2021-33656
https://www.suse.com/security/cve/CVE-2022-1462
https://www.suse.com/security/cve/CVE-2022-20166
Severity: Medium
ID: 163991
File Name: suse_SU-2022-2719-1.nasl
Version: 1.6
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 8/10/2022
Updated: 7/14/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.0
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-20166
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 6.1
Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2021-33656
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_130-default, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-default-man
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/9/2022
Vulnerability Publication Date: 6/2/2022
CVE: CVE-2020-36557, CVE-2020-36558, CVE-2021-33655, CVE-2021-33656, CVE-2022-1462, CVE-2022-20166, CVE-2022-36946
SuSE: SUSE-SU-2022:2719-1