Severity: High
ID: 184732
File Name: rocky_linux_RLSA-2021-0705.nasl
Version: 1.0
Type: local
Published: 11/6/2023
Updated: 11/6/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 6.9
Temporal Score: 5.1
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-20188
Risk Factor: High
Base Score: 7
Temporal Score: 6.1
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:buildah, p-cpe:/a:rocky:linux:buildah-debuginfo, p-cpe:/a:rocky:linux:buildah-debugsource, p-cpe:/a:rocky:linux:container-selinux, p-cpe:/a:rocky:linux:containernetworking-plugins, p-cpe:/a:rocky:linux:containernetworking-plugins-debuginfo, p-cpe:/a:rocky:linux:containernetworking-plugins-debugsource, p-cpe:/a:rocky:linux:containers-common, p-cpe:/a:rocky:linux:crit, p-cpe:/a:rocky:linux:criu, p-cpe:/a:rocky:linux:criu-debuginfo, p-cpe:/a:rocky:linux:criu-debugsource, p-cpe:/a:rocky:linux:fuse-overlayfs, p-cpe:/a:rocky:linux:fuse-overlayfs-debuginfo, p-cpe:/a:rocky:linux:fuse-overlayfs-debugsource, p-cpe:/a:rocky:linux:oci-systemd-hook, p-cpe:/a:rocky:linux:oci-systemd-hook-debuginfo, p-cpe:/a:rocky:linux:oci-systemd-hook-debugsource, p-cpe:/a:rocky:linux:oci-umount, p-cpe:/a:rocky:linux:oci-umount-debuginfo, p-cpe:/a:rocky:linux:oci-umount-debugsource, p-cpe:/a:rocky:linux:podman, p-cpe:/a:rocky:linux:podman-debuginfo, p-cpe:/a:rocky:linux:podman-debugsource, p-cpe:/a:rocky:linux:podman-docker, p-cpe:/a:rocky:linux:python3-criu, p-cpe:/a:rocky:linux:runc, p-cpe:/a:rocky:linux:runc-debuginfo, p-cpe:/a:rocky:linux:runc-debugsource, p-cpe:/a:rocky:linux:skopeo, p-cpe:/a:rocky:linux:skopeo-debuginfo, p-cpe:/a:rocky:linux:skopeo-debugsource, p-cpe:/a:rocky:linux:slirp4netns, p-cpe:/a:rocky:linux:slirp4netns-debuginfo, p-cpe:/a:rocky:linux:slirp4netns-debugsource, cpe:/o:rocky:linux:8
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 3/2/2021
Vulnerability Publication Date: 2/11/2021
CVE: CVE-2021-20188