Language:
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2213408
https://bugzilla.redhat.com/show_bug.cgi?id=2251692
https://bugzilla.redhat.com/show_bug.cgi?id=2259470
https://bugzilla.redhat.com/show_bug.cgi?id=2272202
https://bugzilla.redhat.com/show_bug.cgi?id=2279328
https://bugzilla.redhat.com/show_bug.cgi?id=2292699
https://bugzilla.redhat.com/show_bug.cgi?id=2295391
https://bugzilla.redhat.com/show_bug.cgi?id=2301634
https://bugzilla.redhat.com/show_bug.cgi?id=2303654
https://bugzilla.redhat.com/show_bug.cgi?id=2305975
https://bugzilla.redhat.com/show_bug.cgi?id=2307955
https://bugzilla.redhat.com/show_bug.cgi?id=2308677
https://bugzilla.redhat.com/show_bug.cgi?id=2320103
Severity: High
ID: 211800
File Name: redhat-RHSA-2024-9990.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 11/25/2024
Updated: 11/25/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Vendor Severity: Moderate
Risk Factor: High
Base Score: 7.6
Temporal Score: 5.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2024-8007
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common-devtools, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:python3-tripleo-common, p-cpe:/a:redhat:enterprise_linux:python-tripleoclient, p-cpe:/a:redhat:enterprise_linux:python3-tripleoclient, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common-containers, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-common-container-base
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 11/21/2024
Vulnerability Publication Date: 8/21/2024
CVE: CVE-2024-8007