https://errata.rockylinux.org/RLSA-2022:2200
https://bugzilla.redhat.com/show_bug.cgi?id=2083647
Severity: High
ID: 161345
File Name: rocky_linux_RLSA-2022-2200.nasl
Version: 1.2
Type: local
Published: 5/18/2022
Updated: 5/18/2022
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 5
Temporal Score: 3.7
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Temporal Vector: E:U/RL:OF/RC:C
CVSS Score Source: CVE-2022-29117
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: E:U/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:aspnetcore-runtime-3.1, p-cpe:/a:rocky:linux:aspnetcore-runtime-5.0, p-cpe:/a:rocky:linux:aspnetcore-runtime-6.0, p-cpe:/a:rocky:linux:aspnetcore-targeting-pack-3.1, p-cpe:/a:rocky:linux:aspnetcore-targeting-pack-5.0, p-cpe:/a:rocky:linux:aspnetcore-targeting-pack-6.0, p-cpe:/a:rocky:linux:dotnet, p-cpe:/a:rocky:linux:dotnet-apphost-pack-3.1, p-cpe:/a:rocky:linux:dotnet-apphost-pack-3.1-debuginfo, p-cpe:/a:rocky:linux:dotnet-apphost-pack-5.0, p-cpe:/a:rocky:linux:dotnet-apphost-pack-5.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-apphost-pack-6.0, p-cpe:/a:rocky:linux:dotnet-apphost-pack-6.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-host, p-cpe:/a:rocky:linux:dotnet-host-debuginfo, p-cpe:/a:rocky:linux:dotnet-hostfxr-3.1, p-cpe:/a:rocky:linux:dotnet-hostfxr-3.1-debuginfo, p-cpe:/a:rocky:linux:dotnet-hostfxr-5.0, p-cpe:/a:rocky:linux:dotnet-hostfxr-5.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-hostfxr-6.0, p-cpe:/a:rocky:linux:dotnet-hostfxr-6.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-runtime-3.1, p-cpe:/a:rocky:linux:dotnet-runtime-3.1-debuginfo, p-cpe:/a:rocky:linux:dotnet-runtime-5.0, p-cpe:/a:rocky:linux:dotnet-runtime-5.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-runtime-6.0, p-cpe:/a:rocky:linux:dotnet-runtime-6.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-sdk-3.1, p-cpe:/a:rocky:linux:dotnet-sdk-3.1-debuginfo, p-cpe:/a:rocky:linux:dotnet-sdk-3.1-source-built-artifacts, p-cpe:/a:rocky:linux:dotnet-sdk-5.0, p-cpe:/a:rocky:linux:dotnet-sdk-5.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-sdk-5.0-source-built-artifacts, p-cpe:/a:rocky:linux:dotnet-sdk-6.0, p-cpe:/a:rocky:linux:dotnet-sdk-6.0-debuginfo, p-cpe:/a:rocky:linux:dotnet-targeting-pack-3.1, p-cpe:/a:rocky:linux:dotnet-targeting-pack-5.0, p-cpe:/a:rocky:linux:dotnet-targeting-pack-6.0, p-cpe:/a:rocky:linux:dotnet-templates-3.1, p-cpe:/a:rocky:linux:dotnet-templates-5.0, p-cpe:/a:rocky:linux:dotnet-templates-6.0, p-cpe:/a:rocky:linux:dotnet3.1-debuginfo, p-cpe:/a:rocky:linux:dotnet5.0-debuginfo, p-cpe:/a:rocky:linux:dotnet6.0-debuginfo, p-cpe:/a:rocky:linux:netstandard-targeting-pack-2.1, cpe:/o:rocky:linux:8
Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 5/18/2022
Vulnerability Publication Date: 5/10/2022
CVE: CVE-2022-29117
RLSA: 2022:2200