Language:
https://www.suse.com/security/cve/CVE-2026-7263
https://www.suse.com/security/cve/CVE-2026-7568
https://bugzilla.suse.com/1264769
https://bugzilla.suse.com/1264770
https://bugzilla.suse.com/1264771
https://bugzilla.suse.com/1264772
https://bugzilla.suse.com/1264773
https://bugzilla.suse.com/1264774
https://bugzilla.suse.com/1264775
https://bugzilla.suse.com/1264776
https://bugzilla.suse.com/1264777
https://bugzilla.suse.com/1264778
https://lists.suse.com/pipermail/sle-updates/2026-May/046436.html
https://www.suse.com/security/cve/CVE-2025-14179
https://www.suse.com/security/cve/CVE-2026-6104
https://www.suse.com/security/cve/CVE-2026-6722
https://www.suse.com/security/cve/CVE-2026-6735
https://www.suse.com/security/cve/CVE-2026-7258
https://www.suse.com/security/cve/CVE-2026-7259
深刻度: Critical
ID: 315067
ファイル名: suse_SU-2026-21612-1.nasl
バージョン: 1.1
タイプ: Local
エージェント: unix
ファミリー: SuSE Local Security Checks
公開日: 2026/5/16
更新日: 2026/5/16
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: High
スコア: 7.4
リスクファクター: Critical
基本値: 10
現状値: 7.8
ベクトル: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2026-7261
リスクファクター: Critical
基本値: 9.8
現状値: 8.8
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
リスクファクター: Critical
Base Score: 9.5
Threat Score: 9
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS スコアのソース: CVE-2026-6722
CPE: p-cpe:/a:novell:suse_linux:php8-mysql, p-cpe:/a:novell:suse_linux:php8-embed, p-cpe:/a:novell:suse_linux:php8-iconv, p-cpe:/a:novell:suse_linux:php8-sqlite, p-cpe:/a:novell:suse_linux:php8-sysvmsg, p-cpe:/a:novell:suse_linux:php8-soap, p-cpe:/a:novell:suse_linux:php8-fastcgi, p-cpe:/a:novell:suse_linux:php8-shmop, p-cpe:/a:novell:suse_linux:php8-phar, p-cpe:/a:novell:suse_linux:php8-xmlreader, p-cpe:/a:novell:suse_linux:php8-exif, p-cpe:/a:novell:suse_linux:php8-posix, p-cpe:/a:novell:suse_linux:php8-dba, p-cpe:/a:novell:suse_linux:php8, p-cpe:/a:novell:suse_linux:php8-gettext, p-cpe:/a:novell:suse_linux:php8-bz2, p-cpe:/a:novell:suse_linux:php8-ftp, p-cpe:/a:novell:suse_linux:php8-fpm, p-cpe:/a:novell:suse_linux:php8-zlib, p-cpe:/a:novell:suse_linux:php8-pcntl, p-cpe:/a:novell:suse_linux:php8-mbstring, p-cpe:/a:novell:suse_linux:php8-sockets, p-cpe:/a:novell:suse_linux:php8-intl, p-cpe:/a:novell:suse_linux:php8-tidy, p-cpe:/a:novell:suse_linux:php8-pgsql, p-cpe:/a:novell:suse_linux:php8-xsl, p-cpe:/a:novell:suse_linux:php8-cli, p-cpe:/a:novell:suse_linux:php8-opcache, p-cpe:/a:novell:suse_linux:php8-pdo, p-cpe:/a:novell:suse_linux:php8-ldap, p-cpe:/a:novell:suse_linux:php8-odbc, p-cpe:/a:novell:suse_linux:php8-zip, p-cpe:/a:novell:suse_linux:php8-gd, p-cpe:/a:novell:suse_linux:php8-fileinfo, p-cpe:/a:novell:suse_linux:php8-enchant, p-cpe:/a:novell:suse_linux:php8-ffi, p-cpe:/a:novell:suse_linux:php8-curl, p-cpe:/a:novell:suse_linux:php8-openssl, p-cpe:/a:novell:suse_linux:php8-devel, p-cpe:/a:novell:suse_linux:php8-bcmath, p-cpe:/a:novell:suse_linux:php8-fpm-apache, p-cpe:/a:novell:suse_linux:php8-readline, p-cpe:/a:novell:suse_linux:php8-sodium, p-cpe:/a:novell:suse_linux:php8-sysvsem, p-cpe:/a:novell:suse_linux:php8-calendar, p-cpe:/a:novell:suse_linux:php8-sysvshm, p-cpe:/a:novell:suse_linux:php8-gmp, p-cpe:/a:novell:suse_linux:apache2-mod_php8, cpe:/o:novell:suse_linux:16, p-cpe:/a:novell:suse_linux:php8-ctype, p-cpe:/a:novell:suse_linux:php8-snmp, p-cpe:/a:novell:suse_linux:php8-dom, p-cpe:/a:novell:suse_linux:php8-xmlwriter, p-cpe:/a:novell:suse_linux:php8-tokenizer
必要な KB アイテム: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2026/5/13
脆弱性公開日: 2026/5/6
CVE: CVE-2025-14179, CVE-2026-6104, CVE-2026-6722, CVE-2026-6735, CVE-2026-7258, CVE-2026-7259, CVE-2026-7261, CVE-2026-7262, CVE-2026-7263, CVE-2026-7568
IAVA: 2026-A-0440
SuSE: SUSE-SU-2026:21612-1