Language:
https://security-tracker.debian.org/tracker/source-package/edk2
https://security-tracker.debian.org/tracker/CVE-2022-36763
https://security-tracker.debian.org/tracker/CVE-2022-36764
https://security-tracker.debian.org/tracker/CVE-2022-36765
https://security-tracker.debian.org/tracker/CVE-2023-45229
https://security-tracker.debian.org/tracker/CVE-2023-45230
https://security-tracker.debian.org/tracker/CVE-2023-45231
https://security-tracker.debian.org/tracker/CVE-2023-45232
https://security-tracker.debian.org/tracker/CVE-2023-45233
https://security-tracker.debian.org/tracker/CVE-2023-45234
https://security-tracker.debian.org/tracker/CVE-2023-45235
https://security-tracker.debian.org/tracker/CVE-2023-48733
Severity: High
ID: 190574
File Name: debian_DSA-5624.nasl
Version: 1.3
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 2/15/2024
Updated: 1/24/2025
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 8.3
Temporal Score: 6.5
Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-45235
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.9
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:qemu-efi-aarch64, p-cpe:/a:debian:debian_linux:ovmf, p-cpe:/a:debian:debian_linux:qemu-efi, p-cpe:/a:debian:debian_linux:ovmf-ia32, p-cpe:/a:debian:debian_linux:qemu-efi-arm, cpe:/o:debian:debian_linux:12.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/14/2024
Vulnerability Publication Date: 1/9/2024
CVE: CVE-2022-36763, CVE-2022-36764, CVE-2022-36765, CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-48733