Language:
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2310451
https://bugzilla.redhat.com/show_bug.cgi?id=2310452
https://issues.redhat.com/browse/RHEL-58305
Severity: Medium
ID: 207460
File Name: redhat-RHSA-2024-6847.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 9/19/2024
Updated: 9/19/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Low
Base Score: 3.2
Temporal Score: 2.4
Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:N
CVSS Score Source: CVE-2024-45770
Risk Factor: Medium
Base Score: 4.4
Temporal Score: 3.9
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:pcp-pmda-denki, p-cpe:/a:redhat:enterprise_linux:pcp-import-mrtg2pcp, p-cpe:/a:redhat:enterprise_linux:pcp-doc, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-gpfs, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-nvidia-gpu, p-cpe:/a:redhat:enterprise_linux:pcp-export-zabbix-agent, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-activemq, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-cisco, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-bpf, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-mounts, p-cpe:/a:redhat:enterprise_linux:pcp-export-pcp2influxdb, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-dbping, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-gpsd, p-cpe:/a:redhat:enterprise_linux:python3-pcp, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-postgresql, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-snmp, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-mic, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-hacluster, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-sockets, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-mongodb, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-shping, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-unbound, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-smart, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-pdns, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-mssql, p-cpe:/a:redhat:enterprise_linux:pcp-testsuite, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-infiniband, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-docker, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-gluster, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-json, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-samba, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-nginx, p-cpe:/a:redhat:enterprise_linux:pcp-export-pcp2elasticsearch, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-lustre, p-cpe:/a:redhat:enterprise_linux:pcp-import-sar2pcp, p-cpe:/a:redhat:enterprise_linux:pcp-export-pcp2spark, p-cpe:/a:redhat:enterprise_linux:pcp-import-ganglia2pcp, p-cpe:/a:redhat:enterprise_linux:pcp-libs-devel, p-cpe:/a:redhat:enterprise_linux:pcp-export-pcp2graphite, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-libvirt, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-memcache, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-trace, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-gfs2, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-summary, p-cpe:/a:redhat:enterprise_linux:pcp-gui, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-bash, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-cifs, p-cpe:/a:redhat:enterprise_linux:pcp-import-iostat2pcp, p-cpe:/a:redhat:enterprise_linux:pcp-zeroconf, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-openmetrics, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-named, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-lio, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-postfix, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-weblog, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-mailq, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-haproxy, p-cpe:/a:redhat:enterprise_linux:pcp-export-pcp2zabbix, p-cpe:/a:redhat:enterprise_linux:pcp-export-pcp2json, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-bonding, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-rsyslog, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-netcheck, p-cpe:/a:redhat:enterprise_linux:pcp, p-cpe:/a:redhat:enterprise_linux:pcp-conf, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-elasticsearch, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-bpftrace, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-roomtemp, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-zimbra, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-statsd, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-rabbitmq, p-cpe:/a:redhat:enterprise_linux:pcp-system-tools, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-dm, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-news, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-netfilter, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-podman, p-cpe:/a:redhat:enterprise_linux:perl-pcp-pmda, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-nfsclient, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-bind2, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-bcc, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-apache, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-ds389log, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-redis, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-perfevent, p-cpe:/a:redhat:enterprise_linux:pcp-import-collectl2pcp, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-sendmail, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-slurm, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-oracle, p-cpe:/a:redhat:enterprise_linux:perl-pcp-logsummary, p-cpe:/a:redhat:enterprise_linux:pcp-libs, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-systemd, p-cpe:/a:redhat:enterprise_linux:perl-pcp-logimport, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-lmsensors, cpe:/o:redhat:rhel_eus:9.2, p-cpe:/a:redhat:enterprise_linux:pcp-export-pcp2xml, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-ds389, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-mysql, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-zswap, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-lustrecomm, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-openvswitch, p-cpe:/a:redhat:enterprise_linux:pcp-devel, p-cpe:/a:redhat:enterprise_linux:perl-pcp-mmv, p-cpe:/a:redhat:enterprise_linux:pcp-pmda-logger, p-cpe:/a:redhat:enterprise_linux:pcp-selinux
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 9/19/2024
Vulnerability Publication Date: 9/19/2024
CVE: CVE-2024-45769, CVE-2024-45770