https://security.gd-linux.com/notice/NS-SA-2023-0105
https://security.gd-linux.com/info/CVE-2022-3105
https://security.gd-linux.com/info/CVE-2022-3107
https://security.gd-linux.com/info/CVE-2022-3565
https://security.gd-linux.com/info/CVE-2022-41858
https://security.gd-linux.com/info/CVE-2022-42328
https://security.gd-linux.com/info/CVE-2022-42329
https://security.gd-linux.com/info/CVE-2022-45884
https://security.gd-linux.com/info/CVE-2022-45885
https://security.gd-linux.com/info/CVE-2022-45886
https://security.gd-linux.com/info/CVE-2022-45887
https://security.gd-linux.com/info/CVE-2022-45919
https://security.gd-linux.com/info/CVE-2022-45934
https://security.gd-linux.com/info/CVE-2023-23454
https://security.gd-linux.com/info/CVE-2022-3108
https://security.gd-linux.com/info/CVE-2022-3110
https://security.gd-linux.com/info/CVE-2022-3111
https://security.gd-linux.com/info/CVE-2022-3115
Severity: High
ID: 187365
File Name: newstart_cgsl_NS-SA-2023-0105_kernel.nasl
Version: 1.0
Type: local
Published: 12/27/2023
Updated: 12/27/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2022-45934
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_main:kernel-headers, p-cpe:/a:zte:cgsl_main:kernel-ipaclones-internal, p-cpe:/a:zte:cgsl_main:kernel-modules, p-cpe:/a:zte:cgsl_main:kernel-modules-extra, p-cpe:/a:zte:cgsl_main:kernel-modules-internal, p-cpe:/a:zte:cgsl_main:kernel-selftests-internal, p-cpe:/a:zte:cgsl_main:kernel-sign-keys, p-cpe:/a:zte:cgsl_main:kernel-tools, p-cpe:/a:zte:cgsl_main:kernel-tools-debuginfo, p-cpe:/a:zte:cgsl_main:kernel-tools-libs, p-cpe:/a:zte:cgsl_main:kernel-tools-libs-devel, p-cpe:/a:zte:cgsl_main:perf, p-cpe:/a:zte:cgsl_main:perf-debuginfo, p-cpe:/a:zte:cgsl_main:python3-perf, p-cpe:/a:zte:cgsl_main:python3-perf-debuginfo, p-cpe:/a:zte:cgsl_main:bpftool, p-cpe:/a:zte:cgsl_main:bpftool-debuginfo, p-cpe:/a:zte:cgsl_main:kernel, p-cpe:/a:zte:cgsl_main:kernel-abi-whitelists, p-cpe:/a:zte:cgsl_main:kernel-core, p-cpe:/a:zte:cgsl_main:kernel-cross-headers, p-cpe:/a:zte:cgsl_main:kernel-debug, p-cpe:/a:zte:cgsl_main:kernel-debug-core, p-cpe:/a:zte:cgsl_main:kernel-debug-debuginfo, p-cpe:/a:zte:cgsl_main:kernel-debug-devel, p-cpe:/a:zte:cgsl_main:kernel-debug-modules, p-cpe:/a:zte:cgsl_main:kernel-debug-modules-extra, p-cpe:/a:zte:cgsl_main:kernel-debug-modules-internal, p-cpe:/a:zte:cgsl_main:kernel-debuginfo, p-cpe:/a:zte:cgsl_main:kernel-debuginfo-common-x86_64, p-cpe:/a:zte:cgsl_main:kernel-devel, cpe:/o:zte:cgsl_main:6
Required KB Items: Host/local_checks_enabled, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 7/14/2023
Vulnerability Publication Date: 9/19/2022
CVE: CVE-2022-3105, CVE-2022-3107, CVE-2022-3108, CVE-2022-3110, CVE-2022-3111, CVE-2022-3115, CVE-2022-3239, CVE-2022-3565, CVE-2022-41858, CVE-2022-42328, CVE-2022-42329, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2022-45934, CVE-2023-23454, CVE-2023-23455