Language:
https://access.redhat.com/security/cve/CVE-2019-11840
https://access.redhat.com/security/cve/CVE-2020-8554
https://access.redhat.com/security/cve/CVE-2020-26137
https://access.redhat.com/errata/RHSA-2021:0079
https://bugzilla.redhat.com/1691529
Severity: Medium
ID: 145229
File Name: redhat-RHSA-2021-0079.nasl
Version: 1.13
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 1/20/2021
Updated: 1/26/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 4.2
Risk Factor: Medium
Base Score: 6.4
Temporal Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS Score Source: CVE-2020-26137
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 5.9
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:prometheus, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-cluster-capacity, p-cpe:/a:redhat:enterprise_linux:atomic-enterprise-service-catalog, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node-problem-detector, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-metrics-server, p-cpe:/a:redhat:enterprise_linux:prometheus-alertmanager, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-docker-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-hyperkube, p-cpe:/a:redhat:enterprise_linux:prometheus-node-exporter, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:golang-github-openshift-oauth-proxy, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-descheduler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-service-idler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-hypershift, p-cpe:/a:redhat:enterprise_linux:python2-urllib3, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-autoheal, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-web-console, p-cpe:/a:redhat:enterprise_linux:atomic-enterprise-service-catalog-svcat, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-cluster-autoscaler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-template-service-broker
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/20/2021
Vulnerability Publication Date: 5/9/2019