語系:
https://cwe.mitre.org/data/definitions/120.html
https://cwe.mitre.org/data/definitions/281.html
https://cwe.mitre.org/data/definitions/416.html
https://access.redhat.com/security/cve/CVE-2021-0920
https://access.redhat.com/security/cve/CVE-2021-4028
https://access.redhat.com/security/cve/CVE-2022-0330
https://access.redhat.com/security/cve/CVE-2022-0435
https://access.redhat.com/security/cve/CVE-2022-22942
https://access.redhat.com/errata/RHSA-2022:0772
https://bugzilla.redhat.com/2027201
https://bugzilla.redhat.com/2031930
https://bugzilla.redhat.com/2042404
嚴重性: High
ID: 158727
檔案名稱: redhat-RHSA-2022-0772.nasl
版本: 1.5
類型: local
代理程式: unix
已發布: 2022/3/9
已更新: 2022/5/25
支持的傳感器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent
風險因素: Critical
分數: 9
風險因素: High
基本分數: 9
時間分數: 7.8
媒介: AV:N/AC:L/Au:S/C:C/I:C/A:C
時間媒介: E:H/RL:OF/RC:C
CVSS 評分資料來源: CVE-2022-0435
風險因素: High
基本分數: 8.8
時間分數: 8.4
媒介: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: E:H/RL:O/RC:C
CPE: cpe:/o:redhat:rhel_aus:8.4, cpe:/o:redhat:rhel_e4s:8.4, cpe:/o:redhat:rhel_tus:8.4, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_10_2, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_12_1, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_17_1, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_19_1, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_25_1, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_28_1, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_30_1, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_34_2, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_3_1, p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-305_7_1
必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/3/8
弱點發布日期: 2021/12/15
CISA 已知利用日期: 2022/6/13
CVE: CVE-2021-0920, CVE-2021-4028, CVE-2022-0330, CVE-2022-0435, CVE-2022-22942