Language:
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1152472
https://bugzilla.suse.com/1152489
https://bugzilla.suse.com/1160435
https://bugzilla.suse.com/1187829
https://bugzilla.suse.com/1189998
https://bugzilla.suse.com/1194869
https://bugzilla.suse.com/1205758
https://bugzilla.suse.com/1208410
https://bugzilla.suse.com/1208600
https://bugzilla.suse.com/1209039
https://bugzilla.suse.com/1209367
https://bugzilla.suse.com/1210335
https://bugzilla.suse.com/1211299
https://bugzilla.suse.com/1211346
https://bugzilla.suse.com/1211387
https://bugzilla.suse.com/1211410
https://bugzilla.suse.com/1211449
https://bugzilla.suse.com/1211796
https://bugzilla.suse.com/1211852
https://bugzilla.suse.com/1212051
https://bugzilla.suse.com/1212129
https://bugzilla.suse.com/1212154
https://bugzilla.suse.com/1212155
https://bugzilla.suse.com/1212158
https://bugzilla.suse.com/1212265
https://bugzilla.suse.com/1212350
https://bugzilla.suse.com/1212448
https://bugzilla.suse.com/1212494
https://bugzilla.suse.com/1212495
https://bugzilla.suse.com/1212504
https://bugzilla.suse.com/1212513
https://bugzilla.suse.com/1212540
https://bugzilla.suse.com/1212561
https://bugzilla.suse.com/1212563
https://bugzilla.suse.com/1212564
https://bugzilla.suse.com/1212584
https://bugzilla.suse.com/1212592
https://bugzilla.suse.com/1212603
https://bugzilla.suse.com/1212605
https://bugzilla.suse.com/1212606
https://bugzilla.suse.com/1212619
https://bugzilla.suse.com/1212701
https://bugzilla.suse.com/1212741
https://bugzilla.suse.com/1212835
https://bugzilla.suse.com/1212838
https://bugzilla.suse.com/1212842
https://bugzilla.suse.com/1212861
https://bugzilla.suse.com/1212869
https://bugzilla.suse.com/1212892
http://www.nessus.org/u?47f4fe88
https://www.suse.com/security/cve/CVE-2023-1077
https://www.suse.com/security/cve/CVE-2023-1249
https://www.suse.com/security/cve/CVE-2023-1829
https://www.suse.com/security/cve/CVE-2023-21102
https://www.suse.com/security/cve/CVE-2023-3090
https://www.suse.com/security/cve/CVE-2023-3111
https://www.suse.com/security/cve/CVE-2023-3141
https://www.suse.com/security/cve/CVE-2023-3161
https://www.suse.com/security/cve/CVE-2023-3212
https://www.suse.com/security/cve/CVE-2023-3357
https://www.suse.com/security/cve/CVE-2023-3358
https://www.suse.com/security/cve/CVE-2023-3389
https://www.suse.com/security/cve/CVE-2023-35788
https://www.suse.com/security/cve/CVE-2023-35823
Severity: High
ID: 178303
File Name: suse_SU-2023-2820-1.nasl
Version: 1.0
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 7/14/2023
Updated: 7/14/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2023-35788
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_69-default, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/13/2023
Vulnerability Publication Date: 3/17/2023
CVE: CVE-2023-1077, CVE-2023-1249, CVE-2023-1829, CVE-2023-21102, CVE-2023-3090, CVE-2023-3111, CVE-2023-3141, CVE-2023-3161, CVE-2023-3212, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829
SuSE: SUSE-SU-2023:2820-1