https://errata.rockylinux.org/RLSA-2022:1860
Severity: Medium
ID: 184735
File Name: rocky_linux_RLSA-2022-1860.nasl
Version: 1.1
Type: local
Published: 11/6/2023
Updated: 11/7/2023
Supported Sensors: Continuous Assessment, Nessus
Risk Factor: Low
Score: 2.2
Risk Factor: Medium
Base Score: 5
Temporal Score: 4.1
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2020-13956
Risk Factor: Medium
Base Score: 5.3
Temporal Score: 4.9
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:jansi, p-cpe:/a:rocky:linux:plexus-sec-dispatcher, p-cpe:/a:rocky:linux:atinject, p-cpe:/a:rocky:linux:apache-commons-cli, p-cpe:/a:rocky:linux:google-guice, p-cpe:/a:rocky:linux:httpcomponents-client, p-cpe:/a:rocky:linux:maven-shared-utils, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:maven, p-cpe:/a:rocky:linux:plexus-cipher, p-cpe:/a:rocky:linux:httpcomponents-core, p-cpe:/a:rocky:linux:maven-wagon, p-cpe:/a:rocky:linux:maven-openjdk8, p-cpe:/a:rocky:linux:plexus-containers-component-annotations, p-cpe:/a:rocky:linux:maven-openjdk11, p-cpe:/a:rocky:linux:cdi-api, p-cpe:/a:rocky:linux:aopalliance, p-cpe:/a:rocky:linux:jcl-over-slf4j, p-cpe:/a:rocky:linux:plexus-classworlds, p-cpe:/a:rocky:linux:jsoup, p-cpe:/a:rocky:linux:jsr-305, p-cpe:/a:rocky:linux:apache-commons-lang3, p-cpe:/a:rocky:linux:plexus-utils, p-cpe:/a:rocky:linux:maven-lib, p-cpe:/a:rocky:linux:apache-commons-io, p-cpe:/a:rocky:linux:maven-openjdk17, p-cpe:/a:rocky:linux:sisu, p-cpe:/a:rocky:linux:slf4j, p-cpe:/a:rocky:linux:geronimo-annotation, p-cpe:/a:rocky:linux:guava, p-cpe:/a:rocky:linux:maven-resolver, p-cpe:/a:rocky:linux:plexus-interpolation, p-cpe:/a:rocky:linux:apache-commons-codec
Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/10/2022
Vulnerability Publication Date: 12/2/2020
CVE: CVE-2020-13956