语言:
严重性: High
ID: 177495
文件名: Slackware_SSA_2023-172-02.nasl
版本: 1.2
类型: local
发布时间: 2023/6/22
最近更新时间: 2024/3/4
支持的传感器: Nessus
风险因素: High
分数: 8.9
风险因素: High
基本分数: 7.2
时间分数: 6.3
矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2023-1079
风险因素: High
基本分数: 8.8
时间分数: 8.4
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2022-2196
CPE: p-cpe:/a:slackware:slackware_linux:kernel-generic-smp, cpe:/o:slackware:slackware_linux:15.0, p-cpe:/a:slackware:slackware_linux:kernel-modules, p-cpe:/a:slackware:slackware_linux:kernel-modules-smp, p-cpe:/a:slackware:slackware_linux:kernel-source, p-cpe:/a:slackware:slackware_linux:kernel-huge, p-cpe:/a:slackware:slackware_linux:kernel-huge-smp, p-cpe:/a:slackware:slackware_linux:kernel-generic, p-cpe:/a:slackware:slackware_linux:kernel-headers
必需的 KB 项: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages
可利用: true
易利用性: Exploits are available
补丁发布日期: 2023/6/21
漏洞发布日期: 2022/12/5
Core Impact
CVE: CVE-2022-2196, CVE-2022-27672, CVE-2022-3707, CVE-2022-4269, CVE-2022-4379, CVE-2022-48425, CVE-2023-0459, CVE-2023-1076, CVE-2023-1077, CVE-2023-1078, CVE-2023-1079, CVE-2023-1118, CVE-2023-1281, CVE-2023-1380, CVE-2023-1513, CVE-2023-1611, CVE-2023-1670, CVE-2023-1829, CVE-2023-1855, CVE-2023-1859, CVE-2023-1989, CVE-2023-1990, CVE-2023-2002, CVE-2023-2156, CVE-2023-2162, CVE-2023-2194, CVE-2023-2235, CVE-2023-2248, CVE-2023-2269, CVE-2023-23004, CVE-2023-2483, CVE-2023-25012, CVE-2023-26545, CVE-2023-28466, CVE-2023-2985, CVE-2023-30456, CVE-2023-30772, CVE-2023-31436, CVE-2023-32233, CVE-2023-32269, CVE-2023-33203, CVE-2023-33288, CVE-2023-34256