Language:
https://bugzilla.suse.com/1197219
https://bugzilla.suse.com/1197343
https://bugzilla.suse.com/1197663
https://bugzilla.suse.com/1198400
https://bugzilla.suse.com/1198516
https://bugzilla.suse.com/1198577
https://bugzilla.suse.com/1198660
https://bugzilla.suse.com/1198687
https://bugzilla.suse.com/1198742
https://bugzilla.suse.com/1198777
https://bugzilla.suse.com/1198825
https://bugzilla.suse.com/1199012
https://bugzilla.suse.com/1199063
https://bugzilla.suse.com/1199314
https://bugzilla.suse.com/1199399
https://bugzilla.suse.com/1199426
https://bugzilla.suse.com/1199505
https://bugzilla.suse.com/1199507
https://bugzilla.suse.com/1199605
https://bugzilla.suse.com/1199650
https://bugzilla.suse.com/1200143
https://bugzilla.suse.com/1200144
https://bugzilla.suse.com/1200249
https://www.suse.com/security/cve/CVE-2017-13695
https://www.suse.com/security/cve/CVE-2018-7755
https://www.suse.com/security/cve/CVE-2019-19377
https://www.suse.com/security/cve/CVE-2019-20811
https://www.suse.com/security/cve/CVE-2020-26541
https://www.suse.com/security/cve/CVE-2021-20292
https://bugzilla.suse.com/1028340
https://bugzilla.suse.com/1055710
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1071995
https://bugzilla.suse.com/1084513
https://bugzilla.suse.com/1087082
https://bugzilla.suse.com/1114648
https://bugzilla.suse.com/1158266
https://bugzilla.suse.com/1172456
https://bugzilla.suse.com/1177282
https://bugzilla.suse.com/1182171
https://bugzilla.suse.com/1183723
https://bugzilla.suse.com/1187055
https://bugzilla.suse.com/1191647
https://bugzilla.suse.com/1191958
https://bugzilla.suse.com/1195065
https://bugzilla.suse.com/1195651
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1196367
https://bugzilla.suse.com/1196426
https://bugzilla.suse.com/1196999
https://www.suse.com/security/cve/CVE-2021-20321
https://www.suse.com/security/cve/CVE-2021-33061
https://www.suse.com/security/cve/CVE-2021-38208
https://www.suse.com/security/cve/CVE-2021-39711
https://www.suse.com/security/cve/CVE-2021-43389
https://www.suse.com/security/cve/CVE-2022-1011
https://www.suse.com/security/cve/CVE-2022-1184
https://www.suse.com/security/cve/CVE-2022-1353
https://www.suse.com/security/cve/CVE-2022-1419
https://www.suse.com/security/cve/CVE-2022-1516
https://www.suse.com/security/cve/CVE-2022-1652
https://www.suse.com/security/cve/CVE-2022-1729
https://www.suse.com/security/cve/CVE-2022-1734
https://www.suse.com/security/cve/CVE-2022-1974
https://www.suse.com/security/cve/CVE-2022-1975
https://www.suse.com/security/cve/CVE-2022-21123
https://www.suse.com/security/cve/CVE-2022-21125
https://www.suse.com/security/cve/CVE-2022-21127
https://www.suse.com/security/cve/CVE-2022-21166
https://www.suse.com/security/cve/CVE-2022-21180
https://www.suse.com/security/cve/CVE-2022-21499
https://www.suse.com/security/cve/CVE-2022-22942
https://www.suse.com/security/cve/CVE-2022-28748
深刻度: High
ID: 162399
ファイル名: suse_SU-2022-2111-1.nasl
バージョン: 1.10
タイプ: local
エージェント: unix
ファミリー: SuSE Local Security Checks
公開日: 2022/6/18
更新日: 2023/7/13
サポートされているセンサー: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
リスクファクター: Critical
スコア: 9.2
リスクファクター: High
基本値: 7.2
現状値: 6.3
ベクトル: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2022-1652
リスクファクター: High
基本値: 7.8
現状値: 7.5
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CVSS スコアのソース: CVE-2022-30594
CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-default-man, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-4_12_14-150100_197_114-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, cpe:/o:novell:suse_linux:15
必要な KB アイテム: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/6/17
脆弱性公開日: 2017/8/25
Metasploit (vmwgfx Driver File Descriptor Handling Priv Esc)
CVE: CVE-2017-13695, CVE-2018-7755, CVE-2019-19377, CVE-2019-20811, CVE-2020-26541, CVE-2021-20292, CVE-2021-20321, CVE-2021-33061, CVE-2021-38208, CVE-2021-39711, CVE-2021-43389, CVE-2022-1011, CVE-2022-1184, CVE-2022-1353, CVE-2022-1419, CVE-2022-1516, CVE-2022-1652, CVE-2022-1729, CVE-2022-1734, CVE-2022-1974, CVE-2022-1975, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166, CVE-2022-21180, CVE-2022-21499, CVE-2022-22942, CVE-2022-28748, CVE-2022-30594
SuSE: SUSE-SU-2022:2111-1