Language:
http://www.nessus.org/u?052c3112
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/errata/RHSA-2022:4764
https://bugzilla.redhat.com/show_bug.cgi?id=1768969
https://bugzilla.redhat.com/show_bug.cgi?id=1787192
https://bugzilla.redhat.com/show_bug.cgi?id=1878724
https://bugzilla.redhat.com/show_bug.cgi?id=1986732
https://bugzilla.redhat.com/show_bug.cgi?id=2010478
https://bugzilla.redhat.com/show_bug.cgi?id=2015802
https://bugzilla.redhat.com/show_bug.cgi?id=2028481
https://bugzilla.redhat.com/show_bug.cgi?id=2029830
https://bugzilla.redhat.com/show_bug.cgi?id=2030226
https://bugzilla.redhat.com/show_bug.cgi?id=2039248
https://bugzilla.redhat.com/show_bug.cgi?id=2050108
https://bugzilla.redhat.com/show_bug.cgi?id=2050512
https://bugzilla.redhat.com/show_bug.cgi?id=2052686
https://bugzilla.redhat.com/show_bug.cgi?id=2054733
https://bugzilla.redhat.com/show_bug.cgi?id=2058177
https://bugzilla.redhat.com/show_bug.cgi?id=2060889
Severity: Medium
ID: 161620
File Name: redhat-RHSA-2022-4764.nasl
Version: 1.11
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 5/27/2022
Updated: 11/7/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Low
Score: 3.6
Vendor Severity: Low
Risk Factor: Low
Base Score: 3.8
Temporal Score: 2.8
Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:N/A:N
CVSS Score Source: CVE-2022-0207
Risk Factor: Medium
Base Score: 4.7
Temporal Score: 4.1
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:vdsm-api, p-cpe:/a:redhat:enterprise_linux:vdsm-python, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-openstacknet, p-cpe:/a:redhat:enterprise_linux:vdsm-jsonrpc, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-fcoe, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-cpuflags, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-ethtool-options, p-cpe:/a:redhat:enterprise_linux:vdsm-gluster, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-nestedvt, p-cpe:/a:redhat:enterprise_linux:vdsm, p-cpe:/a:redhat:enterprise_linux:vdsm-client, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-vhostmd, p-cpe:/a:redhat:enterprise_linux:vdsm-yajsonrpc, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-localdisk, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-extra-ipv4-addrs, p-cpe:/a:redhat:enterprise_linux:vdsm-http, p-cpe:/a:redhat:enterprise_linux:vdsm-network, p-cpe:/a:redhat:enterprise_linux:vdsm-common, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-checkips
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 5/26/2022
Vulnerability Publication Date: 5/26/2022
CVE: CVE-2022-0207