Language:
http://www.nessus.org/u?a67eafbc
http://www.nessus.org/u?d2033bbe
https://access.redhat.com/errata/RHSA-2019:0911
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1506782
https://bugzilla.redhat.com/show_bug.cgi?id=1540881
https://bugzilla.redhat.com/show_bug.cgi?id=1593110
https://bugzilla.redhat.com/show_bug.cgi?id=1600138
https://bugzilla.redhat.com/show_bug.cgi?id=1636251
https://bugzilla.redhat.com/show_bug.cgi?id=1638092
https://bugzilla.redhat.com/show_bug.cgi?id=1639833
https://bugzilla.redhat.com/show_bug.cgi?id=1648168
https://bugzilla.redhat.com/show_bug.cgi?id=1649697
https://bugzilla.redhat.com/show_bug.cgi?id=1653307
https://bugzilla.redhat.com/show_bug.cgi?id=1656935
https://bugzilla.redhat.com/show_bug.cgi?id=1660962
https://bugzilla.redhat.com/show_bug.cgi?id=1664869
https://bugzilla.redhat.com/show_bug.cgi?id=1666407
https://bugzilla.redhat.com/show_bug.cgi?id=1666408
https://bugzilla.redhat.com/show_bug.cgi?id=1666409
https://bugzilla.redhat.com/show_bug.cgi?id=1668050
https://bugzilla.redhat.com/show_bug.cgi?id=1668362
https://bugzilla.redhat.com/show_bug.cgi?id=1669901
https://bugzilla.redhat.com/show_bug.cgi?id=1670165
https://bugzilla.redhat.com/show_bug.cgi?id=1670321
https://bugzilla.redhat.com/show_bug.cgi?id=1670663
https://bugzilla.redhat.com/show_bug.cgi?id=1672333
https://bugzilla.redhat.com/show_bug.cgi?id=1672878
https://bugzilla.redhat.com/show_bug.cgi?id=1673687
https://bugzilla.redhat.com/show_bug.cgi?id=1674549
https://bugzilla.redhat.com/show_bug.cgi?id=1678470
https://bugzilla.redhat.com/show_bug.cgi?id=1679263
https://bugzilla.redhat.com/show_bug.cgi?id=1680171
https://bugzilla.redhat.com/show_bug.cgi?id=1683997
https://bugzilla.redhat.com/show_bug.cgi?id=1684146
https://bugzilla.redhat.com/show_bug.cgi?id=1684283
https://bugzilla.redhat.com/show_bug.cgi?id=1684289
https://bugzilla.redhat.com/show_bug.cgi?id=1684435
https://bugzilla.redhat.com/show_bug.cgi?id=1684642
https://bugzilla.redhat.com/show_bug.cgi?id=1685733
https://bugzilla.redhat.com/show_bug.cgi?id=1685735
https://bugzilla.redhat.com/show_bug.cgi?id=1687038
https://bugzilla.redhat.com/show_bug.cgi?id=1687039
https://bugzilla.redhat.com/show_bug.cgi?id=1687041
https://bugzilla.redhat.com/show_bug.cgi?id=1687567
https://bugzilla.redhat.com/show_bug.cgi?id=1687828
https://bugzilla.redhat.com/show_bug.cgi?id=1688330
https://bugzilla.redhat.com/show_bug.cgi?id=1688378
https://bugzilla.redhat.com/show_bug.cgi?id=1688541
https://bugzilla.redhat.com/show_bug.cgi?id=1688869
https://bugzilla.redhat.com/show_bug.cgi?id=1689266
https://bugzilla.redhat.com/show_bug.cgi?id=1689410
https://bugzilla.redhat.com/show_bug.cgi?id=1690941
https://bugzilla.redhat.com/show_bug.cgi?id=1692555
https://bugzilla.redhat.com/show_bug.cgi?id=1693445
https://bugzilla.redhat.com/show_bug.cgi?id=1695174
https://bugzilla.redhat.com/show_bug.cgi?id=1699478
Severity: Medium
ID: 124838
File Name: redhat-RHSA-2019-0911.nasl
Version: 1.9
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 5/13/2019
Updated: 11/6/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Low
Score: 3.8
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2018-12099
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.9
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2018-19039
CPE: p-cpe:/a:redhat:enterprise_linux:python-rgw, p-cpe:/a:redhat:enterprise_linux:python-rbd, p-cpe:/a:redhat:enterprise_linux:ceph-common, p-cpe:/a:redhat:enterprise_linux:ceph-mds, p-cpe:/a:redhat:enterprise_linux:ceph-ansible, p-cpe:/a:redhat:enterprise_linux:ceph-radosgw, p-cpe:/a:redhat:enterprise_linux:grafana, p-cpe:/a:redhat:enterprise_linux:librados2, p-cpe:/a:redhat:enterprise_linux:libcephfs2, p-cpe:/a:redhat:enterprise_linux:ceph, p-cpe:/a:redhat:enterprise_linux:librbd1, p-cpe:/a:redhat:enterprise_linux:ceph-base, p-cpe:/a:redhat:enterprise_linux:librgw2, p-cpe:/a:redhat:enterprise_linux:libradosstriper1, p-cpe:/a:redhat:enterprise_linux:ceph-osd, p-cpe:/a:redhat:enterprise_linux:ceph-mgr, p-cpe:/a:redhat:enterprise_linux:librgw-devel, p-cpe:/a:redhat:enterprise_linux:librados-devel, p-cpe:/a:redhat:enterprise_linux:librbd-devel, p-cpe:/a:redhat:enterprise_linux:ceph-test, p-cpe:/a:redhat:enterprise_linux:ceph-fuse, p-cpe:/a:redhat:enterprise_linux:rbd-mirror, p-cpe:/a:redhat:enterprise_linux:python-rados, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:ceph-selinux, p-cpe:/a:redhat:enterprise_linux:ceph-mon, p-cpe:/a:redhat:enterprise_linux:libcephfs-devel, p-cpe:/a:redhat:enterprise_linux:python-cephfs
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/30/2019
Vulnerability Publication Date: 12/13/2018
CVE: CVE-2018-12099, CVE-2018-19039