Language:
https://bugzilla.suse.com/1191143
https://bugzilla.suse.com/1204235
https://bugzilla.suse.com/1207012
https://bugzilla.suse.com/1207532
https://bugzilla.suse.com/1210928
https://bugzilla.suse.com/1210930
https://bugzilla.suse.com/1211355
https://bugzilla.suse.com/1211560
https://bugzilla.suse.com/1211649
https://bugzilla.suse.com/1212695
https://bugzilla.suse.com/1212904
https://bugzilla.suse.com/1213469
https://bugzilla.suse.com/1214186
https://bugzilla.suse.com/1214471
https://bugzilla.suse.com/1214601
https://bugzilla.suse.com/1214759
https://bugzilla.suse.com/1215209
https://bugzilla.suse.com/1215514
https://bugzilla.suse.com/1215949
https://bugzilla.suse.com/1216030
https://bugzilla.suse.com/1216041
https://bugzilla.suse.com/1216085
https://bugzilla.suse.com/1216128
https://bugzilla.suse.com/1216380
https://bugzilla.suse.com/1216506
https://bugzilla.suse.com/1216555
https://bugzilla.suse.com/1216690
https://bugzilla.suse.com/1216754
https://bugzilla.suse.com/1217038
https://bugzilla.suse.com/1217223
https://bugzilla.suse.com/1217224
Severity: Medium
ID: 187009
File Name: suse_SU-2023-4737-1.nasl
Version: 1.0
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/15/2023
Updated: 12/15/2023
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Low
Score: 3.6
Risk Factor: Medium
Base Score: 4.6
Temporal Score: 3.4
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N
CVSS Score Source: CVE-2023-22644
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 4.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:susemanager-sls, p-cpe:/a:novell:suse_linux:spacewalk-base-minimal-config, p-cpe:/a:novell:suse_linux:subscription-matcher, p-cpe:/a:novell:suse_linux:spacewalk-base-minimal, p-cpe:/a:novell:suse_linux:spacewalk-backend-iss-export, p-cpe:/a:novell:suse_linux:spacewalk-java-postgresql, p-cpe:/a:novell:suse_linux:susemanager-schema-utility, p-cpe:/a:novell:suse_linux:python3-spacewalk-client-tools, p-cpe:/a:novell:suse_linux:billing-data-service, p-cpe:/a:novell:suse_linux:spacewalk-html, p-cpe:/a:novell:suse_linux:spacewalk-java-config, p-cpe:/a:novell:suse_linux:spacecmd, p-cpe:/a:novell:suse_linux:spacewalk-backend-app, p-cpe:/a:novell:suse_linux:inter-server-sync, p-cpe:/a:novell:suse_linux:susemanager-schema, p-cpe:/a:novell:suse_linux:spacewalk-backend-tools, p-cpe:/a:novell:suse_linux:susemanager-docs_en, p-cpe:/a:novell:suse_linux:spacewalk-backend-config-files, p-cpe:/a:novell:suse_linux:spacewalk-backend-xml-export-libs, p-cpe:/a:novell:suse_linux:spacewalk-base, p-cpe:/a:novell:suse_linux:susemanager-tools, p-cpe:/a:novell:suse_linux:spacewalk-backend-iss, p-cpe:/a:novell:suse_linux:spacewalk-backend-applet, p-cpe:/a:novell:suse_linux:spacewalk-backend-server, p-cpe:/a:novell:suse_linux:susemanager-docs_en-pdf, p-cpe:/a:novell:suse_linux:spacewalk-search, p-cpe:/a:novell:suse_linux:apache2-mod_wsgi, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:uyuni-config-modules, p-cpe:/a:novell:suse_linux:spacewalk-backend-xmlrpc, p-cpe:/a:novell:suse_linux:spacewalk-taskomatic, p-cpe:/a:novell:suse_linux:spacewalk-backend, p-cpe:/a:novell:suse_linux:spacewalk-backend-config-files-common, p-cpe:/a:novell:suse_linux:spacewalk-client-tools, p-cpe:/a:novell:suse_linux:spacewalk-java, p-cpe:/a:novell:suse_linux:susemanager-sync-data, p-cpe:/a:novell:suse_linux:spacewalk-backend-config-files-tool, p-cpe:/a:novell:suse_linux:uyuni-reportdb-schema, p-cpe:/a:novell:suse_linux:spacewalk-backend-sql, p-cpe:/a:novell:suse_linux:spacewalk-java-lib, p-cpe:/a:novell:suse_linux:susemanager, p-cpe:/a:novell:suse_linux:spacewalk-backend-package-push-server, p-cpe:/a:novell:suse_linux:spacewalk-backend-sql-postgresql
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 12/13/2023
Vulnerability Publication Date: 9/20/2023
CVE: CVE-2023-22644
SuSE: SUSE-SU-2023:4737-1