Language:
https://bugzilla.suse.com/1087082
https://bugzilla.suse.com/1114648
https://bugzilla.suse.com/1191958
https://www.suse.com/security/cve/CVE-2021-43389
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1197343
https://www.suse.com/security/cve/CVE-2022-1011
https://bugzilla.suse.com/1196367
https://bugzilla.suse.com/1028340
https://bugzilla.suse.com/1172456
https://bugzilla.suse.com/1183723
https://bugzilla.suse.com/1187055
https://bugzilla.suse.com/1191647
https://bugzilla.suse.com/1198400
https://bugzilla.suse.com/1198516
https://bugzilla.suse.com/1198687
https://bugzilla.suse.com/1198742
https://bugzilla.suse.com/1198825
https://bugzilla.suse.com/1199012
https://www.suse.com/security/cve/CVE-2019-20811
https://www.suse.com/security/cve/CVE-2021-20292
https://www.suse.com/security/cve/CVE-2021-20321
https://www.suse.com/security/cve/CVE-2021-38208
https://www.suse.com/security/cve/CVE-2022-1353
https://www.suse.com/security/cve/CVE-2022-1419
https://www.suse.com/security/cve/CVE-2022-1516
https://bugzilla.suse.com/1195651
https://www.suse.com/security/cve/CVE-2022-30594
https://bugzilla.suse.com/1055710
https://bugzilla.suse.com/1158266
https://bugzilla.suse.com/1196426
https://bugzilla.suse.com/1198577
https://bugzilla.suse.com/1199063
https://bugzilla.suse.com/1199314
https://bugzilla.suse.com/1199426
https://bugzilla.suse.com/1199505
https://bugzilla.suse.com/1199507
https://bugzilla.suse.com/1199605
https://bugzilla.suse.com/1199650
https://bugzilla.suse.com/1200143
https://bugzilla.suse.com/1200144
https://bugzilla.suse.com/1200249
https://www.suse.com/security/cve/CVE-2017-13695
https://www.suse.com/security/cve/CVE-2019-19377
https://www.suse.com/security/cve/CVE-2021-33061
https://www.suse.com/security/cve/CVE-2022-1184
https://www.suse.com/security/cve/CVE-2022-1652
https://www.suse.com/security/cve/CVE-2022-1729
https://www.suse.com/security/cve/CVE-2022-1734
https://www.suse.com/security/cve/CVE-2022-1974
https://www.suse.com/security/cve/CVE-2022-1975
https://www.suse.com/security/cve/CVE-2022-21123
https://www.suse.com/security/cve/CVE-2022-21125
https://www.suse.com/security/cve/CVE-2022-21127
https://www.suse.com/security/cve/CVE-2022-21166
https://www.suse.com/security/cve/CVE-2022-21180
https://www.suse.com/security/cve/CVE-2022-21499
https://bugzilla.suse.com/1197219
https://bugzilla.suse.com/1199399
https://www.suse.com/security/cve/CVE-2021-39711
Severity: High
ID: 162381
File Name: suse_SU-2022-2103-1.nasl
Version: 1.4
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/17/2022
Updated: 3/10/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 5.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: CVSS2#E:POC/RL:OF/RC:C
CVSS Score Source: CVE-2022-1652
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2022-30594
CPE: cpe:2.3:o:novell:suse_linux:15:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-default:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-source:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-syms:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-default-base:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-default-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-default-man:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-obs-build:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:reiserfs-kmp-default:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-vanilla-base:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-default-livepatch:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:cluster-md-kmp-default:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:dlm-kmp-default:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:gfs2-kmp-default:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-macros:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:ocfs2-kmp-default:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:suse_linux:kernel-livepatch-4_12_14-150000_150_92-default:*:*:*:*:*:*:*
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/16/2022
Vulnerability Publication Date: 8/25/2017
CVE: CVE-2017-13695, CVE-2019-19377, CVE-2019-20811, CVE-2021-20292, CVE-2021-38208, CVE-2021-20321, CVE-2021-43389, CVE-2021-33061, CVE-2021-39711, CVE-2022-1011, CVE-2022-1184, CVE-2022-1419, CVE-2022-1353, CVE-2022-1516, CVE-2022-1652, CVE-2022-30594, CVE-2022-21166, CVE-2022-1734, CVE-2022-1729, CVE-2022-21499, CVE-2022-1974, CVE-2022-1975, CVE-2022-21127, CVE-2022-21123, CVE-2022-21125, CVE-2022-21180
SuSE: SUSE-SU-2022:2103-1