Language:
https://access.redhat.com/errata/RHSA-2022:7683
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
http://www.nessus.org/u?790bc9ea
http://www.nessus.org/u?ecc48656
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://access.redhat.com/security/updates/classification/#moderate
Severity: High
ID: 167155
File Name: redhat-RHSA-2022-7683.nasl
Version: 1.10
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 11/9/2022
Updated: 11/8/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.0
Vendor Severity: Moderate
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-29581
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
Risk Factor: High
Base Score: 8.6
Threat Score: 8.6
Threat Vector: CVSS:4.0/E:A
Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
CVSS Score Source: CVE-2022-1055
CPE: p-cpe:/a:redhat:enterprise_linux:kernel-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers, p-cpe:/a:redhat:enterprise_linux:kernel-core, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core, p-cpe:/a:redhat:enterprise_linux:kernel, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-modules, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:python3-perf
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/8/2022
Vulnerability Publication Date: 4/2/2021
CISA Known Exploited Vulnerability Due Dates: 7/17/2024
CVE: CVE-2020-36516, CVE-2020-36558, CVE-2021-30002, CVE-2021-3640, CVE-2021-47099, CVE-2021-47580, CVE-2022-0168, CVE-2022-0617, CVE-2022-0854, CVE-2022-1016, CVE-2022-1048, CVE-2022-1055, CVE-2022-1158, CVE-2022-1184, CVE-2022-1263, CVE-2022-1280, CVE-2022-1852, CVE-2022-20368, CVE-2022-20572, CVE-2022-2078, CVE-2022-21499, CVE-2022-2153, CVE-2022-23960, CVE-2022-24448, CVE-2022-2503, CVE-2022-2586, CVE-2022-26373, CVE-2022-2639, CVE-2022-27950, CVE-2022-28390, CVE-2022-28893, CVE-2022-2938, CVE-2022-29581, CVE-2022-3107, CVE-2022-36946, CVE-2022-48738, CVE-2022-48765, CVE-2022-48918