https://bugzilla.suse.com/1154353
https://bugzilla.suse.com/1198778
https://bugzilla.suse.com/1220927
https://www.suse.com/security/cve/CVE-2023-52524
https://bugzilla.suse.com/1231939
https://bugzilla.suse.com/1231940
https://bugzilla.suse.com/1231958
https://bugzilla.suse.com/1231962
https://bugzilla.suse.com/1231992
https://bugzilla.suse.com/1231995
https://bugzilla.suse.com/1232006
https://bugzilla.suse.com/1232163
https://bugzilla.suse.com/1232172
https://www.suse.com/security/cve/CVE-2022-48985
https://www.suse.com/security/cve/CVE-2022-49006
https://www.suse.com/security/cve/CVE-2022-49010
https://www.suse.com/security/cve/CVE-2022-49011
https://www.suse.com/security/cve/CVE-2022-49019
https://www.suse.com/security/cve/CVE-2022-49021
https://www.suse.com/security/cve/CVE-2022-49022
https://www.suse.com/security/cve/CVE-2022-49029
https://www.suse.com/security/cve/CVE-2022-49031
https://www.suse.com/security/cve/CVE-2022-49032
https://bugzilla.suse.com/1231991
https://bugzilla.suse.com/1232224
https://bugzilla.suse.com/1232436
https://bugzilla.suse.com/1233117
https://www.suse.com/security/cve/CVE-2024-49925
https://www.suse.com/security/cve/CVE-2024-50208
https://bugzilla.suse.com/1218644
https://bugzilla.suse.com/1232860
https://bugzilla.suse.com/1232907
https://bugzilla.suse.com/1232919
https://bugzilla.suse.com/1232928
https://bugzilla.suse.com/1233070
https://bugzilla.suse.com/1233293
https://bugzilla.suse.com/1233453
https://bugzilla.suse.com/1233456
https://bugzilla.suse.com/1233468
https://bugzilla.suse.com/1233479
https://bugzilla.suse.com/1233490
https://bugzilla.suse.com/1233491
https://bugzilla.suse.com/1233555
https://bugzilla.suse.com/1233557
http://www.nessus.org/u?b5be4dc1
https://www.suse.com/security/cve/CVE-2024-50089
https://www.suse.com/security/cve/CVE-2024-50115
https://www.suse.com/security/cve/CVE-2024-50125
https://www.suse.com/security/cve/CVE-2024-50127
https://www.suse.com/security/cve/CVE-2024-50154
https://www.suse.com/security/cve/CVE-2024-50205
https://www.suse.com/security/cve/CVE-2024-50264
https://www.suse.com/security/cve/CVE-2024-50267
https://www.suse.com/security/cve/CVE-2024-50279
https://www.suse.com/security/cve/CVE-2024-50290
https://www.suse.com/security/cve/CVE-2024-50301
https://www.suse.com/security/cve/CVE-2024-50302
Severity: High
ID: 213020
File Name: suse_SU-2024-4313-1.nasl
Version: 1.1
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/14/2024
Updated: 12/14/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2024-53061
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_3_18-150300_59_185-default
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 12/13/2024
Vulnerability Publication Date: 5/16/2023
CVE: CVE-2022-48985, CVE-2022-49006, CVE-2022-49010, CVE-2022-49011, CVE-2022-49019, CVE-2022-49021, CVE-2022-49022, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-52524, CVE-2024-49925, CVE-2024-50089, CVE-2024-50115, CVE-2024-50125, CVE-2024-50127, CVE-2024-50154, CVE-2024-50205, CVE-2024-50208, CVE-2024-50264, CVE-2024-50267, CVE-2024-50279, CVE-2024-50290, CVE-2024-50301, CVE-2024-50302, CVE-2024-53061, CVE-2024-53063
SuSE: SUSE-SU-2024:4313-1