Language:
https://bugzilla.redhat.com/show_bug.cgi?id=2226788
https://bugzilla.redhat.com/show_bug.cgi?id=2230042
https://bugzilla.redhat.com/show_bug.cgi?id=2231130
https://bugzilla.redhat.com/show_bug.cgi?id=2231410
https://bugzilla.redhat.com/show_bug.cgi?id=2235306
https://bugzilla.redhat.com/show_bug.cgi?id=2239845
https://bugzilla.redhat.com/show_bug.cgi?id=2239847
https://bugzilla.redhat.com/show_bug.cgi?id=2244720
https://bugzilla.redhat.com/show_bug.cgi?id=2250043
https://bugzilla.redhat.com/show_bug.cgi?id=2253632
https://bugzilla.redhat.com/show_bug.cgi?id=2254961
https://bugzilla.redhat.com/show_bug.cgi?id=2254982
https://bugzilla.redhat.com/show_bug.cgi?id=2255283
https://bugzilla.redhat.com/show_bug.cgi?id=2256490
https://bugzilla.redhat.com/show_bug.cgi?id=2256822
https://bugzilla.redhat.com/show_bug.cgi?id=2257682
https://bugzilla.redhat.com/show_bug.cgi?id=2257979
https://bugzilla.redhat.com/show_bug.cgi?id=2265285
https://bugzilla.redhat.com/show_bug.cgi?id=2265653
https://bugzilla.redhat.com/show_bug.cgi?id=2267695
https://bugzilla.redhat.com/show_bug.cgi?id=2267750
https://bugzilla.redhat.com/show_bug.cgi?id=2267760
https://bugzilla.redhat.com/show_bug.cgi?id=2267761
https://bugzilla.redhat.com/show_bug.cgi?id=2269189
https://bugzilla.redhat.com/show_bug.cgi?id=2269217
https://bugzilla.redhat.com/show_bug.cgi?id=2270836
https://bugzilla.redhat.com/show_bug.cgi?id=2270883
https://issues.redhat.com/browse/RHEL-9128
https://access.redhat.com/errata/RHSA-2024:3138
http://www.nessus.org/u?6c95d9b9
https://access.redhat.com/security/updates/classification/#moderate
http://www.nessus.org/u?99ff6172
https://bugzilla.redhat.com/show_bug.cgi?id=1731000
https://bugzilla.redhat.com/show_bug.cgi?id=1746732
https://bugzilla.redhat.com/show_bug.cgi?id=1888726
https://bugzilla.redhat.com/show_bug.cgi?id=1930388
https://bugzilla.redhat.com/show_bug.cgi?id=1999589
https://bugzilla.redhat.com/show_bug.cgi?id=2039178
https://bugzilla.redhat.com/show_bug.cgi?id=2043520
https://bugzilla.redhat.com/show_bug.cgi?id=2044578
https://bugzilla.redhat.com/show_bug.cgi?id=2150953
https://bugzilla.redhat.com/show_bug.cgi?id=2151959
https://bugzilla.redhat.com/show_bug.cgi?id=2177759
https://bugzilla.redhat.com/show_bug.cgi?id=2179892
https://bugzilla.redhat.com/show_bug.cgi?id=2213132
https://bugzilla.redhat.com/show_bug.cgi?id=2218332
https://bugzilla.redhat.com/show_bug.cgi?id=2219359
https://bugzilla.redhat.com/show_bug.cgi?id=2221039
https://bugzilla.redhat.com/show_bug.cgi?id=2221463
https://bugzilla.redhat.com/show_bug.cgi?id=2221702
https://bugzilla.redhat.com/show_bug.cgi?id=2226777
https://bugzilla.redhat.com/show_bug.cgi?id=2226784
https://bugzilla.redhat.com/show_bug.cgi?id=2226787
https://bugzilla.redhat.com/show_bug.cgi?id=2272811
https://issues.redhat.com/browse/RHEL-15148
https://issues.redhat.com/browse/RHEL-15311
https://issues.redhat.com/browse/RHEL-2524
https://issues.redhat.com/browse/RHEL-2527
Severity: Critical
ID: 197808
File Name: redhat-RHSA-2024-3138.nasl
Version: 1.3
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 5/23/2024
Updated: 11/8/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Vendor Severity: Moderate
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2019-15505
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2023-25775
CPE: p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core, p-cpe:/a:redhat:enterprise_linux:kernel, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-modules, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:python3-perf, p-cpe:/a:redhat:enterprise_linux:kernel-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers, p-cpe:/a:redhat:enterprise_linux:kernel-core
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/22/2024
Vulnerability Publication Date: 7/17/2019
Core Impact
CVE: CVE-2019-13631, CVE-2019-15505, CVE-2020-25656, CVE-2021-3753, CVE-2021-4204, CVE-2022-0500, CVE-2022-23222, CVE-2022-3565, CVE-2022-45934, CVE-2022-48947, CVE-2023-1513, CVE-2023-24023, CVE-2023-25775, CVE-2023-28464, CVE-2023-31083, CVE-2023-3567, CVE-2023-37453, CVE-2023-38409, CVE-2023-39189, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39198, CVE-2023-4133, CVE-2023-4244, CVE-2023-42754, CVE-2023-42755, CVE-2023-45863, CVE-2023-51779, CVE-2023-51780, CVE-2023-52340, CVE-2023-52434, CVE-2023-52448, CVE-2023-52489, CVE-2023-52574, CVE-2023-52580, CVE-2023-52581, CVE-2023-52597, CVE-2023-52620, CVE-2023-6121, CVE-2023-6176, CVE-2023-6622, CVE-2023-6915, CVE-2023-6932, CVE-2024-0841, CVE-2024-25742, CVE-2024-25743, CVE-2024-26602, CVE-2024-26609, CVE-2024-26671