Language:
https://bugzilla.suse.com/1032323
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1198702
https://bugzilla.suse.com/1200465
https://bugzilla.suse.com/1200788
https://bugzilla.suse.com/1201725
https://bugzilla.suse.com/1202686
https://bugzilla.suse.com/1202700
https://bugzilla.suse.com/1203066
https://bugzilla.suse.com/1203098
https://bugzilla.suse.com/1203387
https://bugzilla.suse.com/1203391
https://bugzilla.suse.com/1203496
https://bugzilla.suse.com/1204053
https://bugzilla.suse.com/1204166
https://bugzilla.suse.com/1204168
https://bugzilla.suse.com/1204354
https://bugzilla.suse.com/1204355
https://bugzilla.suse.com/1204382
https://bugzilla.suse.com/1204402
https://bugzilla.suse.com/1204415
https://bugzilla.suse.com/1204417
https://bugzilla.suse.com/1204431
https://bugzilla.suse.com/1204439
https://bugzilla.suse.com/1204470
https://bugzilla.suse.com/1204479
https://bugzilla.suse.com/1204574
https://bugzilla.suse.com/1204575
https://bugzilla.suse.com/1204619
https://bugzilla.suse.com/1204635
https://bugzilla.suse.com/1204637
https://bugzilla.suse.com/1204646
https://bugzilla.suse.com/1204647
https://bugzilla.suse.com/1204653
https://bugzilla.suse.com/1204728
https://bugzilla.suse.com/1204753
https://bugzilla.suse.com/1204754
https://www.suse.com/security/cve/CVE-2021-4037
https://www.suse.com/security/cve/CVE-2022-2153
https://www.suse.com/security/cve/CVE-2022-28748
https://www.suse.com/security/cve/CVE-2022-2964
https://www.suse.com/security/cve/CVE-2022-2978
https://www.suse.com/security/cve/CVE-2022-3176
https://www.suse.com/security/cve/CVE-2022-3424
https://www.suse.com/security/cve/CVE-2022-3521
https://www.suse.com/security/cve/CVE-2022-3524
https://www.suse.com/security/cve/CVE-2022-3535
https://www.suse.com/security/cve/CVE-2022-3542
https://www.suse.com/security/cve/CVE-2022-3545
https://www.suse.com/security/cve/CVE-2022-3565
https://www.suse.com/security/cve/CVE-2022-3577
https://www.suse.com/security/cve/CVE-2022-3586
https://www.suse.com/security/cve/CVE-2022-3594
https://www.suse.com/security/cve/CVE-2022-3621
https://www.suse.com/security/cve/CVE-2022-3625
https://www.suse.com/security/cve/CVE-2022-3629
https://www.suse.com/security/cve/CVE-2022-3640
https://www.suse.com/security/cve/CVE-2022-3646
https://www.suse.com/security/cve/CVE-2022-3649
https://www.suse.com/security/cve/CVE-2022-39189
https://www.suse.com/security/cve/CVE-2022-42703
深刻度: High
ID: 167349
ファイル名: suse_SU-2022-3929-1.nasl
バージョン: 1.7
タイプ: local
エージェント: unix
ファミリー: SuSE Local Security Checks
公開日: 2022/11/13
更新日: 2023/7/14
サポートされているセンサー: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
リスクファクター: Medium
スコア: 6.7
リスクファクター: High
基本値: 8.3
現状値: 6.5
ベクトル: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2022-3640
リスクファクター: High
基本値: 8.8
現状値: 7.9
ベクトル: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt, p-cpe:/a:novell:suse_linux:dlm-kmp-rt, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-devel-rt, p-cpe:/a:novell:suse_linux:kernel-rt, p-cpe:/a:novell:suse_linux:kernel-rt-devel, p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel, p-cpe:/a:novell:suse_linux:kernel-source-rt, p-cpe:/a:novell:suse_linux:kernel-syms-rt, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt, cpe:/o:novell:suse_linux:15
必要な KB アイテム: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/11/10
脆弱性公開日: 2022/3/7
CVE: CVE-2021-4037, CVE-2022-2153, CVE-2022-28748, CVE-2022-2964, CVE-2022-2978, CVE-2022-3176, CVE-2022-3424, CVE-2022-3521, CVE-2022-3524, CVE-2022-3535, CVE-2022-3542, CVE-2022-3545, CVE-2022-3565, CVE-2022-3577, CVE-2022-3586, CVE-2022-3594, CVE-2022-3621, CVE-2022-3625, CVE-2022-3629, CVE-2022-3640, CVE-2022-3646, CVE-2022-3649, CVE-2022-39189, CVE-2022-42703, CVE-2022-43750
SuSE: SUSE-SU-2022:3929-1