Language:
Severity: High
ID: 173437
File Name: ubuntu_USN-5975-1.nasl
Version: 1.6
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 3/27/2023
Updated: 10/29/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Low
Base Score: 2.1
Temporal Score: 1.7
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS Score Source: CVE-2022-29900
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.2
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2022-3640
CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1162-azure, cpe:/o:canonical:ubuntu_linux:16.04:-:esm
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/27/2023
Vulnerability Publication Date: 5/10/2022
CISA Known Exploited Vulnerability Due Dates: 4/20/2023
CVE: CVE-2021-3669, CVE-2022-20369, CVE-2022-26373, CVE-2022-2663, CVE-2022-29900, CVE-2022-29901, CVE-2022-3424, CVE-2022-3521, CVE-2022-3545, CVE-2022-3628, CVE-2022-36280, CVE-2022-3640, CVE-2022-3646, CVE-2022-3649, CVE-2022-39842, CVE-2022-41218, CVE-2022-41849, CVE-2022-41850, CVE-2022-42328, CVE-2022-42329, CVE-2022-42895, CVE-2022-43750, CVE-2022-47929, CVE-2023-0045, CVE-2023-0266, CVE-2023-0394, CVE-2023-0461, CVE-2023-23455, CVE-2023-23559, CVE-2023-26607, CVE-2023-28328
USN: 5975-1