Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 5.9
https://bugzilla.novell.com/show_bug.cgi?id=584493
https://bugzilla.novell.com/show_bug.cgi?id=595586
https://bugzilla.novell.com/show_bug.cgi?id=655693
https://bugzilla.novell.com/show_bug.cgi?id=661979
https://bugzilla.novell.com/show_bug.cgi?id=666423
https://bugzilla.novell.com/show_bug.cgi?id=669889
https://bugzilla.novell.com/show_bug.cgi?id=672008
https://bugzilla.novell.com/show_bug.cgi?id=674648
https://bugzilla.novell.com/show_bug.cgi?id=674982
https://bugzilla.novell.com/show_bug.cgi?id=677827
https://bugzilla.novell.com/show_bug.cgi?id=679545
https://bugzilla.novell.com/show_bug.cgi?id=681826
https://bugzilla.novell.com/show_bug.cgi?id=681840
https://bugzilla.novell.com/show_bug.cgi?id=687368
https://bugzilla.novell.com/show_bug.cgi?id=688432
https://bugzilla.novell.com/show_bug.cgi?id=689583
https://bugzilla.novell.com/show_bug.cgi?id=689797
https://bugzilla.novell.com/show_bug.cgi?id=692497
https://bugzilla.novell.com/show_bug.cgi?id=692502
https://bugzilla.novell.com/show_bug.cgi?id=693013
https://bugzilla.novell.com/show_bug.cgi?id=693043
https://bugzilla.novell.com/show_bug.cgi?id=693374
https://bugzilla.novell.com/show_bug.cgi?id=693382
https://bugzilla.novell.com/show_bug.cgi?id=694498
https://bugzilla.novell.com/show_bug.cgi?id=697859
https://bugzilla.novell.com/show_bug.cgi?id=698221
https://bugzilla.novell.com/show_bug.cgi?id=698247
https://bugzilla.novell.com/show_bug.cgi?id=699123
https://bugzilla.novell.com/show_bug.cgi?id=701998
https://bugzilla.novell.com/show_bug.cgi?id=702013
https://bugzilla.novell.com/show_bug.cgi?id=702285
https://bugzilla.novell.com/show_bug.cgi?id=702579
https://bugzilla.novell.com/show_bug.cgi?id=703155
https://bugzilla.novell.com/show_bug.cgi?id=704788
https://lists.opensuse.org/opensuse-updates/2011-08/msg00002.html
Severity: High
ID: 75880
File Name: suse_11_4_kernel-110726.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 6/13/2014
Updated: 1/14/2021
Dependencies: 12634
Risk Factor: High
VPR Score: 5.9
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-debug-base, p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debuginfo, p-cpe:/a:novell:opensuse:kernel-debug-debugsource, p-cpe:/a:novell:opensuse:kernel-debug-devel, p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-default-base, p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debuginfo, p-cpe:/a:novell:opensuse:kernel-default-debugsource, p-cpe:/a:novell:opensuse:kernel-default-devel, p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop, p-cpe:/a:novell:opensuse:kernel-desktop-base, p-cpe:/a:novell:opensuse:kernel-desktop-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debuginfo, p-cpe:/a:novell:opensuse:kernel-desktop-debugsource, p-cpe:/a:novell:opensuse:kernel-desktop-devel, p-cpe:/a:novell:opensuse:kernel-desktop-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-devel, p-cpe:/a:novell:opensuse:kernel-ec2, p-cpe:/a:novell:opensuse:kernel-ec2-base, p-cpe:/a:novell:opensuse:kernel-ec2-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-debugsource, p-cpe:/a:novell:opensuse:kernel-ec2-devel, p-cpe:/a:novell:opensuse:kernel-ec2-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-ec2-extra, p-cpe:/a:novell:opensuse:kernel-ec2-extra-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-pae-base, p-cpe:/a:novell:opensuse:kernel-pae-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debuginfo, p-cpe:/a:novell:opensuse:kernel-pae-debugsource, p-cpe:/a:novell:opensuse:kernel-pae-devel, p-cpe:/a:novell:opensuse:kernel-pae-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-source-vanilla, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-trace, p-cpe:/a:novell:opensuse:kernel-trace-base, p-cpe:/a:novell:opensuse:kernel-trace-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debuginfo, p-cpe:/a:novell:opensuse:kernel-trace-debugsource, p-cpe:/a:novell:opensuse:kernel-trace-devel, p-cpe:/a:novell:opensuse:kernel-trace-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-vanilla-base, p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo, p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource, p-cpe:/a:novell:opensuse:kernel-vanilla-devel, p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-vmi, p-cpe:/a:novell:opensuse:kernel-vmi-base, p-cpe:/a:novell:opensuse:kernel-vmi-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-vmi-debuginfo, p-cpe:/a:novell:opensuse:kernel-vmi-debugsource, p-cpe:/a:novell:opensuse:kernel-vmi-devel, p-cpe:/a:novell:opensuse:kernel-vmi-devel-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen, p-cpe:/a:novell:opensuse:kernel-xen-base, p-cpe:/a:novell:opensuse:kernel-xen-base-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debuginfo, p-cpe:/a:novell:opensuse:kernel-xen-debugsource, p-cpe:/a:novell:opensuse:kernel-xen-devel, p-cpe:/a:novell:opensuse:kernel-xen-devel-debuginfo, p-cpe:/a:novell:opensuse:preload-kmp-default, p-cpe:/a:novell:opensuse:preload-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:preload-kmp-desktop, p-cpe:/a:novell:opensuse:preload-kmp-desktop-debuginfo, cpe:/o:novell:opensuse:11.4
Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu
Patch Publication Date: 7/26/2011
CVE: CVE-2011-1017, CVE-2011-1020, CVE-2011-1479, CVE-2011-1593, CVE-2011-1745, CVE-2011-1927, CVE-2011-2022, CVE-2011-2182, CVE-2011-2484, CVE-2011-2491, CVE-2011-2493, CVE-2011-2495, CVE-2011-2496, CVE-2011-2498