Language:
https://bugzilla.suse.com/1190256
https://bugzilla.suse.com/1190497
https://bugzilla.suse.com/1199291
https://bugzilla.suse.com/1199356
https://bugzilla.suse.com/1199665
https://bugzilla.suse.com/1201258
https://bugzilla.suse.com/1201323
https://bugzilla.suse.com/1201391
https://bugzilla.suse.com/1201458
https://bugzilla.suse.com/1201592
https://bugzilla.suse.com/1201593
https://bugzilla.suse.com/1201595
https://bugzilla.suse.com/1201596
https://bugzilla.suse.com/1201635
https://bugzilla.suse.com/1201651
https://bugzilla.suse.com/1201691
https://bugzilla.suse.com/1201705
https://bugzilla.suse.com/1201726
https://bugzilla.suse.com/1201846
https://bugzilla.suse.com/1201930
https://bugzilla.suse.com/1202094
https://www.suse.com/security/cve/CVE-2021-33655
https://www.suse.com/security/cve/CVE-2022-21505
https://www.suse.com/security/cve/CVE-2022-2585
https://www.suse.com/security/cve/CVE-2022-26373
Severity: High
ID: 164099
File Name: suse_SU-2022-2803-1.nasl
Version: 1.8
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 8/13/2022
Updated: 7/14/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-29581
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_18-default, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/12/2022
Vulnerability Publication Date: 5/17/2022
CVE: CVE-2021-33655, CVE-2022-21505, CVE-2022-2585, CVE-2022-26373, CVE-2022-29581
SuSE: SUSE-SU-2022:2803-1