https://bugzilla.redhat.com/show_bug.cgi?id=2042603
https://bugzilla.redhat.com/show_bug.cgi?id=2054494
https://bugzilla.redhat.com/show_bug.cgi?id=2054495
https://bugzilla.redhat.com/show_bug.cgi?id=2064145
https://bugzilla.redhat.com/show_bug.cgi?id=2064146
https://bugzilla.redhat.com/show_bug.cgi?id=2064148
https://bugzilla.redhat.com/show_bug.cgi?id=2064406
https://bugzilla.redhat.com/show_bug.cgi?id=2064411
Severity: High
ID: 167830
File Name: rocky_linux_RLSA-2022-7585.nasl
Version: 1.6
Type: local
Published: 11/17/2022
Updated: 11/6/2023
Supported Sensors: Continuous Assessment, Nessus
Risk Factor: Medium
Score: 5.0
Risk Factor: Medium
Base Score: 5.8
Temporal Score: 4.5
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P
CVSS Score Source: CVE-2022-0891
Risk Factor: High
Base Score: 7.1
Temporal Score: 6.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:libtiff-debuginfo, p-cpe:/a:rocky:linux:libtiff-debugsource, p-cpe:/a:rocky:linux:libtiff-tools, p-cpe:/a:rocky:linux:libtiff-tools-debuginfo, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:libtiff-devel, p-cpe:/a:rocky:linux:libtiff
Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/13/2022
Vulnerability Publication Date: 11/13/2022
CVE: CVE-2022-0561, CVE-2022-0562, CVE-2022-0865, CVE-2022-0891, CVE-2022-0908, CVE-2022-0909, CVE-2022-0924, CVE-2022-1355, CVE-2022-22844