語系:
https://access.redhat.com/security/cve/CVE-2021-3744
https://access.redhat.com/security/cve/CVE-2021-3752
https://access.redhat.com/security/cve/CVE-2021-3759
https://access.redhat.com/security/cve/CVE-2021-3764
https://access.redhat.com/security/cve/CVE-2021-3772
https://access.redhat.com/security/cve/CVE-2021-3773
https://access.redhat.com/security/cve/CVE-2021-4002
https://access.redhat.com/security/cve/CVE-2021-4037
https://access.redhat.com/security/cve/CVE-2021-4083
https://access.redhat.com/security/cve/CVE-2021-4157
https://access.redhat.com/security/cve/CVE-2021-4197
https://access.redhat.com/security/cve/CVE-2021-4203
https://access.redhat.com/security/cve/CVE-2021-20322
https://access.redhat.com/security/cve/CVE-2021-26401
https://access.redhat.com/security/cve/CVE-2021-29154
https://access.redhat.com/security/cve/CVE-2021-37159
https://access.redhat.com/security/cve/CVE-2021-41864
https://access.redhat.com/security/cve/CVE-2021-42739
https://access.redhat.com/security/cve/CVE-2021-43389
https://access.redhat.com/security/cve/CVE-2021-43976
https://access.redhat.com/security/cve/CVE-2021-44733
https://access.redhat.com/security/cve/CVE-2021-45485
https://access.redhat.com/security/cve/CVE-2021-45486
https://access.redhat.com/security/cve/CVE-2022-0001
https://access.redhat.com/security/cve/CVE-2022-0002
https://access.redhat.com/security/cve/CVE-2022-0286
https://access.redhat.com/security/cve/CVE-2022-0322
https://access.redhat.com/security/cve/CVE-2022-1011
https://access.redhat.com/errata/RHSA-2022:1975
https://bugzilla.redhat.com/1901726
https://bugzilla.redhat.com/1919791
https://bugzilla.redhat.com/1946684
https://bugzilla.redhat.com/1951739
https://bugzilla.redhat.com/1974079
https://bugzilla.redhat.com/1985353
https://bugzilla.redhat.com/1986473
https://bugzilla.redhat.com/1997467
https://bugzilla.redhat.com/1997961
https://bugzilla.redhat.com/1999544
https://bugzilla.redhat.com/1999675
https://bugzilla.redhat.com/2000627
https://bugzilla.redhat.com/2000694
https://bugzilla.redhat.com/2004949
https://bugzilla.redhat.com/2010463
https://bugzilla.redhat.com/2013180
https://bugzilla.redhat.com/2014230
https://bugzilla.redhat.com/2016169
https://bugzilla.redhat.com/2018205
https://bugzilla.redhat.com/2025003
https://bugzilla.redhat.com/2025726
https://bugzilla.redhat.com/2027239
https://bugzilla.redhat.com/2029923
https://bugzilla.redhat.com/2030747
https://bugzilla.redhat.com/2034342
https://bugzilla.redhat.com/2035652
https://bugzilla.redhat.com/2036934
https://bugzilla.redhat.com/2037019
https://bugzilla.redhat.com/2039911
https://bugzilla.redhat.com/2039914
https://bugzilla.redhat.com/2042822
https://bugzilla.redhat.com/2061700
https://bugzilla.redhat.com/2061712
https://bugzilla.redhat.com/2061721
https://bugzilla.redhat.com/2064855
https://access.redhat.com/security/cve/CVE-2020-0404
https://access.redhat.com/security/cve/CVE-2020-13974
https://access.redhat.com/security/cve/CVE-2020-27820
https://access.redhat.com/security/cve/CVE-2021-0941
https://access.redhat.com/security/cve/CVE-2021-3612
嚴重性: Critical
ID: 161034
檔案名稱: redhat-RHSA-2022-1975.nasl
版本: 1.7
類型: local
代理程式: unix
發布日期: 2022/5/11
更新日期: 2023/1/23
支援的感應器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent
風險因素: Medium
分數: 6.7
風險因素: High
基本分數: 7.9
時間分數: 6.2
媒介: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C
時間媒介: CVSS2#E:POC/RL:OF/RC:C
CVSS 評分資料來源: CVE-2021-3752
風險因素: Critical
基本分數: 9.8
時間分數: 8.8
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CVSS 評分資料來源: CVE-2021-3773
CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:redhat:enterprise_linux:kernel-rt-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra
必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/5/10
弱點發布日期: 2020/6/9
CVE: CVE-2020-0404, CVE-2020-13974, CVE-2020-27820, CVE-2021-0941, CVE-2021-20322, CVE-2021-26401, CVE-2021-29154, CVE-2021-3612, CVE-2021-3669, CVE-2021-37159, CVE-2021-3743, CVE-2021-3744, CVE-2021-3752, CVE-2021-3759, CVE-2021-3764, CVE-2021-3772, CVE-2021-3773, CVE-2021-4002, CVE-2021-4037, CVE-2021-4083, CVE-2021-4157, CVE-2021-41864, CVE-2021-4197, CVE-2021-4203, CVE-2021-42739, CVE-2021-43389, CVE-2021-43976, CVE-2021-44733, CVE-2021-45485, CVE-2021-45486, CVE-2022-0001, CVE-2022-0002, CVE-2022-0286, CVE-2022-0322, CVE-2022-1011