Language:
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1076830
https://bugzilla.suse.com/1109158
https://bugzilla.suse.com/1181001
https://bugzilla.suse.com/1191924
https://bugzilla.suse.com/1193231
https://bugzilla.suse.com/1199837
https://bugzilla.suse.com/1203092
https://bugzilla.suse.com/1203693
https://bugzilla.suse.com/1206010
https://bugzilla.suse.com/1207001
https://bugzilla.suse.com/1207036
https://bugzilla.suse.com/1207125
https://bugzilla.suse.com/1207795
https://bugzilla.suse.com/1207890
https://bugzilla.suse.com/1208048
https://bugzilla.suse.com/1208179
https://bugzilla.suse.com/1208599
https://bugzilla.suse.com/1208777
https://bugzilla.suse.com/1208850
https://bugzilla.suse.com/1209008
https://bugzilla.suse.com/1209052
https://bugzilla.suse.com/1209118
https://bugzilla.suse.com/1209126
https://bugzilla.suse.com/1209256
https://bugzilla.suse.com/1209289
https://bugzilla.suse.com/1209291
https://bugzilla.suse.com/1209292
https://bugzilla.suse.com/1209532
https://bugzilla.suse.com/1209547
https://bugzilla.suse.com/1209549
https://bugzilla.suse.com/1209556
https://bugzilla.suse.com/1209572
https://bugzilla.suse.com/1209634
https://bugzilla.suse.com/1209684
https://bugzilla.suse.com/1209778
https://bugzilla.suse.com/1209798
https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html
https://www.suse.com/security/cve/CVE-2017-5753
https://www.suse.com/security/cve/CVE-2021-3923
https://www.suse.com/security/cve/CVE-2022-20567
https://www.suse.com/security/cve/CVE-2023-0590
https://www.suse.com/security/cve/CVE-2023-1076
https://www.suse.com/security/cve/CVE-2023-1095
https://www.suse.com/security/cve/CVE-2023-1281
https://www.suse.com/security/cve/CVE-2023-1390
https://www.suse.com/security/cve/CVE-2023-1513
https://www.suse.com/security/cve/CVE-2023-23454
https://www.suse.com/security/cve/CVE-2023-23455
https://www.suse.com/security/cve/CVE-2023-28328
Severity: High
ID: 174047
File Name: suse_SU-2023-1803-1.nasl
Version: 1.4
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 4/11/2023
Updated: 7/14/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 8.4
Risk Factor: Medium
Base Score: 4.7
Temporal Score: 4.1
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS Score Source: CVE-2017-5753
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2023-28464
CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_156-default, p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-default-man
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/10/2023
Vulnerability Publication Date: 1/3/2018
CANVAS (CANVAS)
CVE: CVE-2017-5753, CVE-2021-3923, CVE-2022-20567, CVE-2023-0590, CVE-2023-1076, CVE-2023-1095, CVE-2023-1281, CVE-2023-1390, CVE-2023-1513, CVE-2023-23454, CVE-2023-23455, CVE-2023-28328, CVE-2023-28464, CVE-2023-28772
SuSE: SUSE-SU-2023:1803-1