Language:
https://access.redhat.com/security/cve/CVE-2021-2154
https://access.redhat.com/security/cve/CVE-2021-2166
https://access.redhat.com/security/cve/CVE-2021-2372
https://access.redhat.com/security/cve/CVE-2021-2389
https://access.redhat.com/security/cve/CVE-2021-35604
https://access.redhat.com/security/cve/CVE-2021-46657
https://access.redhat.com/security/cve/CVE-2021-46658
https://access.redhat.com/security/cve/CVE-2021-46662
https://access.redhat.com/security/cve/CVE-2021-46666
https://access.redhat.com/security/cve/CVE-2021-46667
https://access.redhat.com/security/cve/CVE-2022-21451
https://access.redhat.com/security/cve/CVE-2022-27385
https://access.redhat.com/security/cve/CVE-2022-31621
https://access.redhat.com/security/cve/CVE-2022-31624
https://access.redhat.com/errata/RHSA-2022:1556
https://bugzilla.redhat.com/1951752
https://bugzilla.redhat.com/1951755
https://bugzilla.redhat.com/1992303
https://bugzilla.redhat.com/1992309
https://bugzilla.redhat.com/2016101
https://bugzilla.redhat.com/2049294
https://bugzilla.redhat.com/2049305
https://bugzilla.redhat.com/2050019
https://bugzilla.redhat.com/2050028
https://bugzilla.redhat.com/2050030
https://bugzilla.redhat.com/2075001
https://bugzilla.redhat.com/2082651
Severity: Medium
ID: 160230
File Name: redhat-RHSA-2022-1556.nasl
Version: 1.10
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 4/27/2022
Updated: 11/1/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 4.5
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P
CVSS Score Source: CVE-2021-35604
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 5.1
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:judy, p-cpe:/a:redhat:enterprise_linux:galera, p-cpe:/a:redhat:enterprise_linux:mariadb, p-cpe:/a:redhat:enterprise_linux:mariadb-backup, p-cpe:/a:redhat:enterprise_linux:mariadb-common, p-cpe:/a:redhat:enterprise_linux:mariadb-devel, p-cpe:/a:redhat:enterprise_linux:mariadb-embedded, p-cpe:/a:redhat:enterprise_linux:mariadb-embedded-devel, p-cpe:/a:redhat:enterprise_linux:mariadb-errmsg, p-cpe:/a:redhat:enterprise_linux:mariadb-gssapi-server, p-cpe:/a:redhat:enterprise_linux:mariadb-oqgraph-engine, p-cpe:/a:redhat:enterprise_linux:mariadb-server, p-cpe:/a:redhat:enterprise_linux:mariadb-server-galera, p-cpe:/a:redhat:enterprise_linux:mariadb-server-utils, p-cpe:/a:redhat:enterprise_linux:mariadb-test
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/26/2022
Vulnerability Publication Date: 4/20/2021
CVE: CVE-2021-2154, CVE-2021-2166, CVE-2021-2372, CVE-2021-2389, CVE-2021-35604, CVE-2021-46657, CVE-2021-46658, CVE-2021-46662, CVE-2021-46666, CVE-2021-46667, CVE-2022-21451, CVE-2022-27385, CVE-2022-31621, CVE-2022-31624