Language:
http://www.nessus.org/u?631e8042
http://www.nessus.org/u?cc7115e8
https://access.redhat.com/errata/RHSA-2019:2294
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1501450
https://bugzilla.redhat.com/show_bug.cgi?id=1558558
https://bugzilla.redhat.com/show_bug.cgi?id=1584663
https://bugzilla.redhat.com/show_bug.cgi?id=1592737
https://bugzilla.redhat.com/show_bug.cgi?id=1594266
https://bugzilla.redhat.com/show_bug.cgi?id=1609454
https://bugzilla.redhat.com/show_bug.cgi?id=1609720
https://bugzilla.redhat.com/show_bug.cgi?id=1612943
https://bugzilla.redhat.com/show_bug.cgi?id=1692296
https://bugzilla.redhat.com/show_bug.cgi?id=1703661
https://bugzilla.redhat.com/show_bug.cgi?id=1716387
https://bugzilla.redhat.com/show_bug.cgi?id=1718172
https://bugzilla.redhat.com/show_bug.cgi?id=1613737
https://bugzilla.redhat.com/show_bug.cgi?id=1615680
https://bugzilla.redhat.com/show_bug.cgi?id=1628469
https://bugzilla.redhat.com/show_bug.cgi?id=1628892
https://bugzilla.redhat.com/show_bug.cgi?id=1631606
https://bugzilla.redhat.com/show_bug.cgi?id=1631622
https://bugzilla.redhat.com/show_bug.cgi?id=1632833
https://bugzilla.redhat.com/show_bug.cgi?id=1633077
https://bugzilla.redhat.com/show_bug.cgi?id=1633389
https://bugzilla.redhat.com/show_bug.cgi?id=1640465
https://bugzilla.redhat.com/show_bug.cgi?id=1641702
https://bugzilla.redhat.com/show_bug.cgi?id=1647365
https://bugzilla.redhat.com/show_bug.cgi?id=1652894
https://bugzilla.redhat.com/show_bug.cgi?id=1656360
https://bugzilla.redhat.com/show_bug.cgi?id=1657468
https://bugzilla.redhat.com/show_bug.cgi?id=1658198
https://bugzilla.redhat.com/show_bug.cgi?id=1658406
https://bugzilla.redhat.com/show_bug.cgi?id=1658652
https://bugzilla.redhat.com/show_bug.cgi?id=1660531
https://bugzilla.redhat.com/show_bug.cgi?id=1663051
https://bugzilla.redhat.com/show_bug.cgi?id=1665228
https://bugzilla.redhat.com/show_bug.cgi?id=1665474
https://bugzilla.redhat.com/show_bug.cgi?id=1665553
https://bugzilla.redhat.com/show_bug.cgi?id=1669581
https://bugzilla.redhat.com/show_bug.cgi?id=1669586
https://bugzilla.redhat.com/show_bug.cgi?id=1672957
https://bugzilla.redhat.com/show_bug.cgi?id=1683175
https://bugzilla.redhat.com/show_bug.cgi?id=1690122
Severity: Medium
ID: 127708
File Name: redhat-RHSA-2019-2294.nasl
Version: 1.8
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 8/12/2019
Updated: 11/6/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.2
Vendor Severity: Moderate
Risk Factor: Low
Base Score: 3.5
Temporal Score: 2.7
Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P
CVSS Score Source: CVE-2019-3840
Risk Factor: Medium
Base Score: 6.3
Temporal Score: 5.7
Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon, p-cpe:/a:redhat:enterprise_linux:libvirt-client, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:redhat:enterprise_linux:libvirt-login-shell, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-core, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:redhat:enterprise_linux:libvirt-nss, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-lxc, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-network, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-lxc, p-cpe:/a:redhat:enterprise_linux:libvirt-bash-completion, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-config-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-secret, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nodedev, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-network, p-cpe:/a:redhat:enterprise_linux:libvirt, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:redhat:enterprise_linux:libvirt-libs, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-qemu, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:redhat:enterprise_linux:libvirt-devel, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-interface, p-cpe:/a:redhat:enterprise_linux:libvirt-docs, p-cpe:/a:redhat:enterprise_linux:libvirt-admin, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-kvm, p-cpe:/a:redhat:enterprise_linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:redhat:enterprise_linux:libvirt-lock-sanlock
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/6/2019
Vulnerability Publication Date: 3/27/2019
CVE: CVE-2019-3840