Language:
https://bugzilla.suse.com/1133374
https://bugzilla.suse.com/1191881
https://bugzilla.suse.com/1196616
https://bugzilla.suse.com/1201420
https://bugzilla.suse.com/1201726
https://bugzilla.suse.com/1201948
https://bugzilla.suse.com/1202096
https://bugzilla.suse.com/1202346
https://bugzilla.suse.com/1202347
https://bugzilla.suse.com/1202393
https://bugzilla.suse.com/1202897
https://bugzilla.suse.com/1202898
https://bugzilla.suse.com/1203098
https://bugzilla.suse.com/1203107
https://www.suse.com/security/cve/CVE-2019-3900
https://www.suse.com/security/cve/CVE-2020-36516
https://www.suse.com/security/cve/CVE-2022-20368
https://www.suse.com/security/cve/CVE-2022-20369
https://www.suse.com/security/cve/CVE-2022-21385
https://www.suse.com/security/cve/CVE-2022-2588
https://www.suse.com/security/cve/CVE-2022-26373
https://www.suse.com/security/cve/CVE-2022-2991
https://www.suse.com/security/cve/CVE-2022-3028
https://www.suse.com/security/cve/CVE-2022-36879
Severity: High
ID: 165193
File Name: suse_SU-2022-3263-1.nasl
Version: 1.9
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 9/15/2022
Updated: 1/15/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.5
Risk Factor: Medium
Base Score: 4.9
Temporal Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:P
CVSS Score Source: CVE-2020-36516
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2022-2588
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/14/2022
Vulnerability Publication Date: 4/25/2019
Core Impact
CVE: CVE-2019-3900, CVE-2020-36516, CVE-2022-20368, CVE-2022-20369, CVE-2022-21385, CVE-2022-2588, CVE-2022-26373, CVE-2022-2991, CVE-2022-3028, CVE-2022-36879, CVE-2022-39188
SuSE: SUSE-SU-2022:3263-1