Language:
http://www.nessus.org/u?269e893b
http://www.nessus.org/u?619e5320
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/errata/RHSA-2023:6368
https://bugzilla.redhat.com/show_bug.cgi?id=1886123
https://bugzilla.redhat.com/show_bug.cgi?id=1934134
https://bugzilla.redhat.com/show_bug.cgi?id=1946716
https://bugzilla.redhat.com/show_bug.cgi?id=1947230
https://bugzilla.redhat.com/show_bug.cgi?id=2040509
https://bugzilla.redhat.com/show_bug.cgi?id=2046606
https://bugzilla.redhat.com/show_bug.cgi?id=2057267
https://bugzilla.redhat.com/show_bug.cgi?id=2058982
https://bugzilla.redhat.com/show_bug.cgi?id=2084442
https://bugzilla.redhat.com/show_bug.cgi?id=2087047
https://bugzilla.redhat.com/show_bug.cgi?id=2090998
https://bugzilla.redhat.com/show_bug.cgi?id=2106726
https://bugzilla.redhat.com/show_bug.cgi?id=2124756
https://bugzilla.redhat.com/show_bug.cgi?id=2128929
https://bugzilla.redhat.com/show_bug.cgi?id=2141965
https://bugzilla.redhat.com/show_bug.cgi?id=2158430
https://bugzilla.redhat.com/show_bug.cgi?id=2165917
https://bugzilla.redhat.com/show_bug.cgi?id=2167838
https://bugzilla.redhat.com/show_bug.cgi?id=2174676
https://bugzilla.redhat.com/show_bug.cgi?id=2176702
https://bugzilla.redhat.com/show_bug.cgi?id=2176926
https://bugzilla.redhat.com/show_bug.cgi?id=2177620
https://bugzilla.redhat.com/show_bug.cgi?id=2179033
https://bugzilla.redhat.com/show_bug.cgi?id=2180076
https://bugzilla.redhat.com/show_bug.cgi?id=2180806
https://bugzilla.redhat.com/show_bug.cgi?id=2180898
https://bugzilla.redhat.com/show_bug.cgi?id=2185688
https://bugzilla.redhat.com/show_bug.cgi?id=2186725
https://bugzilla.redhat.com/show_bug.cgi?id=2189423
https://bugzilla.redhat.com/show_bug.cgi?id=2196289
https://bugzilla.redhat.com/show_bug.cgi?id=2203387
https://bugzilla.redhat.com/show_bug.cgi?id=2203512
https://bugzilla.redhat.com/show_bug.cgi?id=2207940
https://bugzilla.redhat.com/show_bug.cgi?id=2211609
https://bugzilla.redhat.com/show_bug.cgi?id=2211634
https://bugzilla.redhat.com/show_bug.cgi?id=2213317
https://bugzilla.redhat.com/show_bug.cgi?id=2215819
https://bugzilla.redhat.com/show_bug.cgi?id=2216201
https://bugzilla.redhat.com/show_bug.cgi?id=2218644
https://bugzilla.redhat.com/show_bug.cgi?id=2219224
https://bugzilla.redhat.com/show_bug.cgi?id=2220866
https://bugzilla.redhat.com/show_bug.cgi?id=2222579
https://bugzilla.redhat.com/show_bug.cgi?id=2223691
https://bugzilla.redhat.com/show_bug.cgi?id=2225354
https://bugzilla.redhat.com/show_bug.cgi?id=2225439
https://bugzilla.redhat.com/show_bug.cgi?id=2229133
Severity: High
ID: 185130
File Name: redhat-RHSA-2023-6368.nasl
Version: 1.4
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 11/7/2023
Updated: 11/7/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 6.5
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 4.8
Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C
CVSS Score Source: CVE-2023-2680
Risk Factor: High
Base Score: 8.2
Temporal Score: 7.1
Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:qemu-guest-agent, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu-pci, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-rbd, p-cpe:/a:redhat:enterprise_linux:qemu-img, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-vga, p-cpe:/a:redhat:enterprise_linux:qemu-kvm, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-usb-redirect, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-curl, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-usb-host, p-cpe:/a:redhat:enterprise_linux:qemu-pr-helper, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-ui-opengl, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu-ccw, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-docs, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-device-display-virtio-gpu, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-core, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-ui-egl-headless, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-block-blkio, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-audio-pa, p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 11/7/2023
Vulnerability Publication Date: 9/13/2023
CVE: CVE-2023-2680