Language:
http://www.nessus.org/u?40ee78ef
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/errata/RHSA-2020:3003
https://bugzilla.redhat.com/show_bug.cgi?id=1756077
https://bugzilla.redhat.com/show_bug.cgi?id=1785445
https://bugzilla.redhat.com/show_bug.cgi?id=1791143
https://bugzilla.redhat.com/show_bug.cgi?id=1797774
https://bugzilla.redhat.com/show_bug.cgi?id=1800644
https://bugzilla.redhat.com/show_bug.cgi?id=1800664
https://bugzilla.redhat.com/show_bug.cgi?id=1809003
https://bugzilla.redhat.com/show_bug.cgi?id=1809870
https://bugzilla.redhat.com/show_bug.cgi?id=1810949
https://bugzilla.redhat.com/show_bug.cgi?id=1812962
https://bugzilla.redhat.com/show_bug.cgi?id=1814177
https://bugzilla.redhat.com/show_bug.cgi?id=1816478
https://bugzilla.redhat.com/show_bug.cgi?id=1819667
https://bugzilla.redhat.com/show_bug.cgi?id=1826002
https://bugzilla.redhat.com/show_bug.cgi?id=1827607
https://bugzilla.redhat.com/show_bug.cgi?id=1828232
https://bugzilla.redhat.com/show_bug.cgi?id=1829389
https://bugzilla.redhat.com/show_bug.cgi?id=1829646
https://bugzilla.redhat.com/show_bug.cgi?id=1829758
https://bugzilla.redhat.com/show_bug.cgi?id=1829985
https://bugzilla.redhat.com/show_bug.cgi?id=1830330
https://bugzilla.redhat.com/show_bug.cgi?id=1833309
https://bugzilla.redhat.com/show_bug.cgi?id=1833685
https://bugzilla.redhat.com/show_bug.cgi?id=1834697
https://bugzilla.redhat.com/show_bug.cgi?id=1834974
https://bugzilla.redhat.com/show_bug.cgi?id=1835216
https://bugzilla.redhat.com/show_bug.cgi?id=1835777
https://bugzilla.redhat.com/show_bug.cgi?id=1837645
https://bugzilla.redhat.com/show_bug.cgi?id=1838931
https://bugzilla.redhat.com/show_bug.cgi?id=1838959
https://bugzilla.redhat.com/show_bug.cgi?id=1838996
https://bugzilla.redhat.com/show_bug.cgi?id=1839134
https://bugzilla.redhat.com/show_bug.cgi?id=1839149
https://bugzilla.redhat.com/show_bug.cgi?id=1839216
https://bugzilla.redhat.com/show_bug.cgi?id=1839228
https://bugzilla.redhat.com/show_bug.cgi?id=1840730
https://bugzilla.redhat.com/show_bug.cgi?id=1840744
https://bugzilla.redhat.com/show_bug.cgi?id=1840858
https://bugzilla.redhat.com/show_bug.cgi?id=1843500
https://bugzilla.redhat.com/show_bug.cgi?id=1843569
https://bugzilla.redhat.com/show_bug.cgi?id=1844496
https://bugzilla.redhat.com/show_bug.cgi?id=1845668
https://bugzilla.redhat.com/show_bug.cgi?id=1846995
https://bugzilla.redhat.com/show_bug.cgi?id=1849559
https://bugzilla.redhat.com/show_bug.cgi?id=1849803
https://bugzilla.redhat.com/show_bug.cgi?id=1850814
Severity: Medium
ID: 138764
File Name: redhat-RHSA-2020-3003.nasl
Version: 1.10
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 7/20/2020
Updated: 11/7/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Low
Score: 3.6
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.2
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2020-1760
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2020-10753
CPE: p-cpe:/a:redhat:enterprise_linux:python3-ceph-argparse, p-cpe:/a:redhat:enterprise_linux:ceph-medic, p-cpe:/a:redhat:enterprise_linux:librgw2, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-ceph, p-cpe:/a:redhat:enterprise_linux:ceph-mgr-diskprediction-local, p-cpe:/a:redhat:enterprise_linux:libradospp-devel, p-cpe:/a:redhat:enterprise_linux:libradosstriper1, p-cpe:/a:redhat:enterprise_linux:ceph-osd, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-rados-grace, p-cpe:/a:redhat:enterprise_linux:ceph-mgr, p-cpe:/a:redhat:enterprise_linux:ceph-grafana-dashboards, p-cpe:/a:redhat:enterprise_linux:librgw-devel, p-cpe:/a:redhat:enterprise_linux:ceph-mgr-k8sevents, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-rgw, p-cpe:/a:redhat:enterprise_linux:librados-devel, p-cpe:/a:redhat:enterprise_linux:librbd-devel, p-cpe:/a:redhat:enterprise_linux:ceph-test, p-cpe:/a:redhat:enterprise_linux:python3-cephfs, p-cpe:/a:redhat:enterprise_linux:python-rgw, p-cpe:/a:redhat:enterprise_linux:python-rbd, p-cpe:/a:redhat:enterprise_linux:ceph-common, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-proxy, p-cpe:/a:redhat:enterprise_linux:ceph-mds, p-cpe:/a:redhat:enterprise_linux:ceph-ansible, p-cpe:/a:redhat:enterprise_linux:ceph-mgr-dashboard, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:ceph-radosgw, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-vfs, p-cpe:/a:redhat:enterprise_linux:ceph-mgr-rook, p-cpe:/a:redhat:enterprise_linux:librados2, p-cpe:/a:redhat:enterprise_linux:libcephfs2, p-cpe:/a:redhat:enterprise_linux:ceph, p-cpe:/a:redhat:enterprise_linux:python3-rados, p-cpe:/a:redhat:enterprise_linux:rbd-nbd, p-cpe:/a:redhat:enterprise_linux:librbd1, p-cpe:/a:redhat:enterprise_linux:ceph-base, p-cpe:/a:redhat:enterprise_linux:ceph-fuse, p-cpe:/a:redhat:enterprise_linux:rbd-mirror, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-rados-urls, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-selinux, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha, p-cpe:/a:redhat:enterprise_linux:cockpit-ceph-installer, p-cpe:/a:redhat:enterprise_linux:python-rados, p-cpe:/a:redhat:enterprise_linux:python3-rbd, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:ceph-selinux, p-cpe:/a:redhat:enterprise_linux:ceph-mon, p-cpe:/a:redhat:enterprise_linux:python3-rgw, p-cpe:/a:redhat:enterprise_linux:libcephfs-devel, p-cpe:/a:redhat:enterprise_linux:python-cephfs, p-cpe:/a:redhat:enterprise_linux:python-ceph-argparse
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 7/20/2020
Vulnerability Publication Date: 4/22/2020
CVE: CVE-2020-10753, CVE-2020-1760