https://errata.rockylinux.org/RLSA-2022:8067
https://bugzilla.redhat.com/show_bug.cgi?id=2064319
https://bugzilla.redhat.com/show_bug.cgi?id=2064320
https://bugzilla.redhat.com/show_bug.cgi?id=2064322
https://bugzilla.redhat.com/show_bug.cgi?id=2073459
https://bugzilla.redhat.com/show_bug.cgi?id=2075406
https://bugzilla.redhat.com/show_bug.cgi?id=2079939
https://bugzilla.redhat.com/show_bug.cgi?id=2094997
https://bugzilla.redhat.com/show_bug.cgi?id=2095002
https://bugzilla.redhat.com/show_bug.cgi?id=2095006
https://bugzilla.redhat.com/show_bug.cgi?id=2095012
https://bugzilla.redhat.com/show_bug.cgi?id=2095015
https://bugzilla.redhat.com/show_bug.cgi?id=2095018
Severity: Critical
ID: 170713
File Name: rocky_linux_RLSA-2022-8067.nasl
Version: 1.4
Type: local
Published: 1/27/2023
Updated: 11/6/2023
Supported Sensors: Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-31813
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:mod_lua, p-cpe:/a:rocky:linux:httpd-filesystem, p-cpe:/a:rocky:linux:httpd-devel, p-cpe:/a:rocky:linux:mod_ssl, p-cpe:/a:rocky:linux:mod_proxy_html-debuginfo, p-cpe:/a:rocky:linux:mod_ssl-debuginfo, p-cpe:/a:rocky:linux:httpd, p-cpe:/a:rocky:linux:mod_lua-debuginfo, p-cpe:/a:rocky:linux:mod_ldap-debuginfo, p-cpe:/a:rocky:linux:httpd-manual, p-cpe:/a:rocky:linux:mod_proxy_html, p-cpe:/a:rocky:linux:httpd-core-debuginfo, p-cpe:/a:rocky:linux:httpd-tools-debuginfo, p-cpe:/a:rocky:linux:httpd-core, p-cpe:/a:rocky:linux:httpd-debuginfo, cpe:/o:rocky:linux:9, p-cpe:/a:rocky:linux:mod_ldap, p-cpe:/a:rocky:linux:mod_session-debuginfo, p-cpe:/a:rocky:linux:httpd-debugsource, p-cpe:/a:rocky:linux:httpd-tools, p-cpe:/a:rocky:linux:mod_session
Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/26/2023
Vulnerability Publication Date: 1/26/2023
CVE: CVE-2022-22719, CVE-2022-22721, CVE-2022-23943, CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, CVE-2022-30556, CVE-2022-31813