Language:
https://bugzilla.redhat.com/show_bug.cgi?id=1347174
https://bugzilla.redhat.com/show_bug.cgi?id=1347205
https://bugzilla.redhat.com/show_bug.cgi?id=1347664
https://bugzilla.redhat.com/show_bug.cgi?id=1348928
https://bugzilla.redhat.com/show_bug.cgi?id=1348940
https://bugzilla.redhat.com/show_bug.cgi?id=1349116
https://bugzilla.redhat.com/show_bug.cgi?id=1349332
https://bugzilla.redhat.com/show_bug.cgi?id=1349955
https://bugzilla.redhat.com/show_bug.cgi?id=1349999
https://bugzilla.redhat.com/show_bug.cgi?id=1350522
https://bugzilla.redhat.com/show_bug.cgi?id=1351484
https://bugzilla.redhat.com/show_bug.cgi?id=1352888
https://bugzilla.redhat.com/show_bug.cgi?id=1354459
https://bugzilla.redhat.com/show_bug.cgi?id=1356931
https://bugzilla.redhat.com/show_bug.cgi?id=1358024
https://bugzilla.redhat.com/show_bug.cgi?id=1359712
https://bugzilla.redhat.com/show_bug.cgi?id=1360849
https://bugzilla.redhat.com/show_bug.cgi?id=1364352
https://bugzilla.redhat.com/show_bug.cgi?id=1364353
https://bugzilla.redhat.com/show_bug.cgi?id=1365648
https://bugzilla.redhat.com/show_bug.cgi?id=1367182
https://bugzilla.redhat.com/show_bug.cgi?id=1367442
https://bugzilla.redhat.com/show_bug.cgi?id=1372346
https://bugzilla.redhat.com/show_bug.cgi?id=1374224
https://bugzilla.redhat.com/show_bug.cgi?id=1377774
http://www.nessus.org/u?40581b09
https://access.redhat.com/errata/RHSA-2016:2815
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1241725
https://bugzilla.redhat.com/show_bug.cgi?id=1265792
https://bugzilla.redhat.com/show_bug.cgi?id=1300855
https://bugzilla.redhat.com/show_bug.cgi?id=1314582
https://bugzilla.redhat.com/show_bug.cgi?id=1314584
https://bugzilla.redhat.com/show_bug.cgi?id=1318409
https://bugzilla.redhat.com/show_bug.cgi?id=1326740
https://bugzilla.redhat.com/show_bug.cgi?id=1331770
https://bugzilla.redhat.com/show_bug.cgi?id=1332513
https://bugzilla.redhat.com/show_bug.cgi?id=1333398
https://bugzilla.redhat.com/show_bug.cgi?id=1339256
https://bugzilla.redhat.com/show_bug.cgi?id=1340004
https://bugzilla.redhat.com/show_bug.cgi?id=1340772
https://bugzilla.redhat.com/show_bug.cgi?id=1346946
https://bugzilla.redhat.com/show_bug.cgi?id=1347137
https://bugzilla.redhat.com/show_bug.cgi?id=1378675
https://bugzilla.redhat.com/show_bug.cgi?id=1379835
https://bugzilla.redhat.com/show_bug.cgi?id=1380601
https://bugzilla.redhat.com/show_bug.cgi?id=1381687
https://bugzilla.redhat.com/show_bug.cgi?id=1381692
https://bugzilla.redhat.com/show_bug.cgi?id=1381694
https://bugzilla.redhat.com/show_bug.cgi?id=1382044
https://bugzilla.redhat.com/show_bug.cgi?id=1383631
https://bugzilla.redhat.com/show_bug.cgi?id=1383728
https://bugzilla.redhat.com/show_bug.cgi?id=1384002
https://bugzilla.redhat.com/show_bug.cgi?id=1384008
https://bugzilla.redhat.com/show_bug.cgi?id=1384230
https://bugzilla.redhat.com/show_bug.cgi?id=1384748
https://bugzilla.redhat.com/show_bug.cgi?id=1385729
https://bugzilla.redhat.com/show_bug.cgi?id=1386910
https://bugzilla.redhat.com/show_bug.cgi?id=1386939
https://bugzilla.redhat.com/show_bug.cgi?id=1387332
Severity: Medium
ID: 110330
File Name: redhat-RHSA-2016-2815.nasl
Version: 1.9
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 6/6/2018
Updated: 3/20/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Low
Score: 3.6
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSS Score Source: CVE-2016-8626
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.7
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:ceph-iscsi-tools, p-cpe:/a:redhat:enterprise_linux:librgw2, p-cpe:/a:redhat:enterprise_linux:ceph-osd, p-cpe:/a:redhat:enterprise_linux:ceph-iscsi-config, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-rgw, p-cpe:/a:redhat:enterprise_linux:libntirpc, p-cpe:/a:redhat:enterprise_linux:ceph-test, p-cpe:/a:redhat:enterprise_linux:librbd1-devel, p-cpe:/a:redhat:enterprise_linux:python-rbd, p-cpe:/a:redhat:enterprise_linux:libcephfs1-devel, p-cpe:/a:redhat:enterprise_linux:ceph-common, p-cpe:/a:redhat:enterprise_linux:ceph-mds, p-cpe:/a:redhat:enterprise_linux:ceph-radosgw, p-cpe:/a:redhat:enterprise_linux:librados2, p-cpe:/a:redhat:enterprise_linux:ceph, p-cpe:/a:redhat:enterprise_linux:librbd1, p-cpe:/a:redhat:enterprise_linux:ceph-base, p-cpe:/a:redhat:enterprise_linux:ceph-fuse, p-cpe:/a:redhat:enterprise_linux:libcephfs1, p-cpe:/a:redhat:enterprise_linux:rbd-mirror, p-cpe:/a:redhat:enterprise_linux:calamari-server, p-cpe:/a:redhat:enterprise_linux:librados2-devel, p-cpe:/a:redhat:enterprise_linux:ceph-deploy, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha, p-cpe:/a:redhat:enterprise_linux:python-rados, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:ceph-selinux, p-cpe:/a:redhat:enterprise_linux:ceph-mon, p-cpe:/a:redhat:enterprise_linux:python-cephfs, p-cpe:/a:redhat:enterprise_linux:librgw2-devel
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 3/17/2017
Vulnerability Publication Date: 7/31/2018
CVE: CVE-2016-8626