Language:
https://bugzilla.suse.com/1202353
https://bugzilla.suse.com/1205128
https://bugzilla.suse.com/1209613
https://bugzilla.suse.com/1209687
https://bugzilla.suse.com/1209777
https://bugzilla.suse.com/1209871
https://bugzilla.suse.com/1209887
https://bugzilla.suse.com/1210202
https://bugzilla.suse.com/1210301
https://bugzilla.suse.com/1210329
https://bugzilla.suse.com/1210336
https://bugzilla.suse.com/1210337
https://bugzilla.suse.com/1210469
https://bugzilla.suse.com/1210498
https://bugzilla.suse.com/1210506
https://bugzilla.suse.com/1210647
https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html
https://www.suse.com/security/cve/CVE-2020-36691
https://www.suse.com/security/cve/CVE-2022-43945
https://www.suse.com/security/cve/CVE-2023-1611
https://www.suse.com/security/cve/CVE-2023-1670
https://www.suse.com/security/cve/CVE-2023-1855
https://www.suse.com/security/cve/CVE-2023-1989
https://www.suse.com/security/cve/CVE-2023-1990
https://www.suse.com/security/cve/CVE-2023-1998
https://www.suse.com/security/cve/CVE-2023-2124
Severity: High
ID: 175552
File Name: suse_SU-2023-2151-1.nasl
Version: 1.3
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 5/13/2023
Updated: 10/23/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2023-2124
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-livepatch-4_12_14-150100_197_145-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-man
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/9/2023
Vulnerability Publication Date: 11/4/2022
CVE: CVE-2020-36691, CVE-2022-43945, CVE-2023-1611, CVE-2023-1670, CVE-2023-1855, CVE-2023-1989, CVE-2023-1990, CVE-2023-1998, CVE-2023-2124, CVE-2023-2162, CVE-2023-30772
SuSE: SUSE-SU-2023:2151-1