CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
98.1%
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:4451 advisory.
GNOME is the default desktop environment of Red Hat Enterprise Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal- gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Red Hat Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2020:4451. The text
# itself is copyright (C) Red Hat, Inc.
##
include('compat.inc');
if (description)
{
script_id(142418);
script_version("1.15");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/04");
script_cve_id(
"CVE-2019-8625",
"CVE-2019-8710",
"CVE-2019-8720",
"CVE-2019-8743",
"CVE-2019-8764",
"CVE-2019-8766",
"CVE-2019-8769",
"CVE-2019-8771",
"CVE-2019-8782",
"CVE-2019-8783",
"CVE-2019-8808",
"CVE-2019-8811",
"CVE-2019-8812",
"CVE-2019-8813",
"CVE-2019-8814",
"CVE-2019-8815",
"CVE-2019-8816",
"CVE-2019-8819",
"CVE-2019-8820",
"CVE-2019-8823",
"CVE-2019-8835",
"CVE-2019-8844",
"CVE-2019-8846",
"CVE-2020-3862",
"CVE-2020-3864",
"CVE-2020-3865",
"CVE-2020-3867",
"CVE-2020-3868",
"CVE-2020-3885",
"CVE-2020-3894",
"CVE-2020-3895",
"CVE-2020-3897",
"CVE-2020-3899",
"CVE-2020-3900",
"CVE-2020-3901",
"CVE-2020-3902",
"CVE-2020-9802",
"CVE-2020-9803",
"CVE-2020-9805",
"CVE-2020-9806",
"CVE-2020-9807",
"CVE-2020-9843",
"CVE-2020-9850",
"CVE-2020-9862",
"CVE-2020-9893",
"CVE-2020-9894",
"CVE-2020-9895",
"CVE-2020-9915",
"CVE-2020-9925",
"CVE-2020-9952",
"CVE-2021-30666",
"CVE-2021-30761",
"CVE-2021-30762",
"CVE-2020-10018",
"CVE-2020-11793",
"CVE-2020-14391",
"CVE-2020-15503"
);
script_xref(name:"RHSA", value:"2020:4451");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/06/13");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2021/11/17");
script_name(english:"RHEL 8 : GNOME (RHSA-2020:4451)");
script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as
referenced in the RHSA-2020:4451 advisory.
GNOME is the default desktop environment of Red Hat Enterprise Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8),
pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-
gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743,
CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808,
CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819,
CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864,
CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897,
CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Red Hat Customer Portal password logged and passed as command line argument when
user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and
other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes
linked from the References section.
Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b7e37d18");
# https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_4451.json
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?dd0db1d1");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2020:4451");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1207179");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1566027");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1569868");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1652178");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1656262");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1668895");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1692536");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1706008");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1706076");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1715845");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1719937");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1758891");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1775345");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1778579");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1779691");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1794045");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1804719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1805929");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1811721");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1814820");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1816070");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1816678");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1816684");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1816686");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1817143");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1820759");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1820760");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1824362");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1827030");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1829369");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1832347");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1833158");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1837381");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1837406");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1837413");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1837648");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1840080");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1840788");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1843486");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1844578");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1846191");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1847051");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1847061");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1847062");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1847203");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1853477");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1854734");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1866332");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1868260");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1872270");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1873093");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1873963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876462");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876463");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876465");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876468");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876470");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876472");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876473");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876476");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876518");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876521");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876522");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876523");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876536");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876537");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876540");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876543");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876545");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876548");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876549");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876550");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876552");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876553");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876554");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876556");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876590");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876591");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876594");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876607");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876611");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1876619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1877853");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879532");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879536");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879538");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879540");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879541");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879545");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879557");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879563");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879564");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879566");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1879568");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1880339");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/updates/classification/#moderate");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3899");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-9895");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Safari in Operator Side Effect Exploit');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_cwe_id(20, 77, 79, 119, 120, 125, 284, 400, 416, 522, 841);
script_set_attribute(attribute:"vendor_severity", value:"Moderate");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/23");
script_set_attribute(attribute:"patch_publication_date", value:"2020/11/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/11/04");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:LibRaw-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gnome-settings-daemon");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:webkit2gtk3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:webkit2gtk3-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:webkit2gtk3-jsc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:webkit2gtk3-jsc-devel");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Red Hat Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "redhat_repos.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
include('rhel.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RedHat/release');
if (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');
var os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
os_ver = os_ver[1];
if (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);
if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
var constraints = [
{
'repo_relative_urls': [
'content/dist/rhel8/8.10/ppc64le/appstream/debug',
'content/dist/rhel8/8.10/ppc64le/appstream/os',
'content/dist/rhel8/8.10/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.10/ppc64le/codeready-builder/debug',
'content/dist/rhel8/8.10/ppc64le/codeready-builder/os',
'content/dist/rhel8/8.10/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel8/8.10/x86_64/appstream/debug',
'content/dist/rhel8/8.10/x86_64/appstream/os',
'content/dist/rhel8/8.10/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8.10/x86_64/codeready-builder/debug',
'content/dist/rhel8/8.10/x86_64/codeready-builder/os',
'content/dist/rhel8/8.10/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel8/8.6/ppc64le/appstream/debug',
'content/dist/rhel8/8.6/ppc64le/appstream/os',
'content/dist/rhel8/8.6/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.6/ppc64le/codeready-builder/debug',
'content/dist/rhel8/8.6/ppc64le/codeready-builder/os',
'content/dist/rhel8/8.6/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel8/8.6/x86_64/appstream/debug',
'content/dist/rhel8/8.6/x86_64/appstream/os',
'content/dist/rhel8/8.6/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8.6/x86_64/codeready-builder/debug',
'content/dist/rhel8/8.6/x86_64/codeready-builder/os',
'content/dist/rhel8/8.6/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel8/8.8/ppc64le/appstream/debug',
'content/dist/rhel8/8.8/ppc64le/appstream/os',
'content/dist/rhel8/8.8/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.8/ppc64le/codeready-builder/debug',
'content/dist/rhel8/8.8/ppc64le/codeready-builder/os',
'content/dist/rhel8/8.8/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel8/8.8/x86_64/appstream/debug',
'content/dist/rhel8/8.8/x86_64/appstream/os',
'content/dist/rhel8/8.8/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8.8/x86_64/codeready-builder/debug',
'content/dist/rhel8/8.8/x86_64/codeready-builder/os',
'content/dist/rhel8/8.8/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel8/8.9/ppc64le/appstream/debug',
'content/dist/rhel8/8.9/ppc64le/appstream/os',
'content/dist/rhel8/8.9/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.9/ppc64le/codeready-builder/debug',
'content/dist/rhel8/8.9/ppc64le/codeready-builder/os',
'content/dist/rhel8/8.9/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel8/8.9/x86_64/appstream/debug',
'content/dist/rhel8/8.9/x86_64/appstream/os',
'content/dist/rhel8/8.9/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8.9/x86_64/codeready-builder/debug',
'content/dist/rhel8/8.9/x86_64/codeready-builder/os',
'content/dist/rhel8/8.9/x86_64/codeready-builder/source/SRPMS',
'content/dist/rhel8/8/ppc64le/appstream/debug',
'content/dist/rhel8/8/ppc64le/appstream/os',
'content/dist/rhel8/8/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8/ppc64le/codeready-builder/debug',
'content/dist/rhel8/8/ppc64le/codeready-builder/os',
'content/dist/rhel8/8/ppc64le/codeready-builder/source/SRPMS',
'content/dist/rhel8/8/x86_64/appstream/debug',
'content/dist/rhel8/8/x86_64/appstream/os',
'content/dist/rhel8/8/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8/x86_64/codeready-builder/debug',
'content/dist/rhel8/8/x86_64/codeready-builder/os',
'content/dist/rhel8/8/x86_64/codeready-builder/source/SRPMS'
],
'pkgs': [
{'reference':'LibRaw-0.19.5-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2020-15503']},
{'reference':'LibRaw-0.19.5-2.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2020-15503']},
{'reference':'LibRaw-0.19.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2020-15503']},
{'reference':'LibRaw-devel-0.19.5-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2020-15503']},
{'reference':'LibRaw-devel-0.19.5-2.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2020-15503']},
{'reference':'LibRaw-devel-0.19.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2020-15503']}
]
},
{
'repo_relative_urls': [
'content/dist/rhel8/8.10/ppc64le/appstream/debug',
'content/dist/rhel8/8.10/ppc64le/appstream/os',
'content/dist/rhel8/8.10/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.10/x86_64/appstream/debug',
'content/dist/rhel8/8.10/x86_64/appstream/os',
'content/dist/rhel8/8.10/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8.6/ppc64le/appstream/debug',
'content/dist/rhel8/8.6/ppc64le/appstream/os',
'content/dist/rhel8/8.6/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.6/x86_64/appstream/debug',
'content/dist/rhel8/8.6/x86_64/appstream/os',
'content/dist/rhel8/8.6/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8.8/ppc64le/appstream/debug',
'content/dist/rhel8/8.8/ppc64le/appstream/os',
'content/dist/rhel8/8.8/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.8/x86_64/appstream/debug',
'content/dist/rhel8/8.8/x86_64/appstream/os',
'content/dist/rhel8/8.8/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8.9/ppc64le/appstream/debug',
'content/dist/rhel8/8.9/ppc64le/appstream/os',
'content/dist/rhel8/8.9/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8.9/x86_64/appstream/debug',
'content/dist/rhel8/8.9/x86_64/appstream/os',
'content/dist/rhel8/8.9/x86_64/appstream/source/SRPMS',
'content/dist/rhel8/8/ppc64le/appstream/debug',
'content/dist/rhel8/8/ppc64le/appstream/os',
'content/dist/rhel8/8/ppc64le/appstream/source/SRPMS',
'content/dist/rhel8/8/x86_64/appstream/debug',
'content/dist/rhel8/8/x86_64/appstream/os',
'content/dist/rhel8/8/x86_64/appstream/source/SRPMS'
],
'pkgs': [
{'reference':'gnome-settings-daemon-3.32.0-11.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2020-14391']},
{'reference':'webkit2gtk3-2.28.4-1.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2019-8625', 'CVE-2019-8710', 'CVE-2019-8720', 'CVE-2019-8743', 'CVE-2019-8764', 'CVE-2019-8766', 'CVE-2019-8769', 'CVE-2019-8771', 'CVE-2019-8782', 'CVE-2019-8783', 'CVE-2019-8808', 'CVE-2019-8811', 'CVE-2019-8812', 'CVE-2019-8813', 'CVE-2019-8814', 'CVE-2019-8815', 'CVE-2019-8816', 'CVE-2019-8819', 'CVE-2019-8820', 'CVE-2019-8823', 'CVE-2019-8835', 'CVE-2019-8844', 'CVE-2019-8846', 'CVE-2020-3862', 'CVE-2020-3864', 'CVE-2020-3865', 'CVE-2020-3867', 'CVE-2020-3868', 'CVE-2020-3885', 'CVE-2020-3894', 'CVE-2020-3895', 'CVE-2020-3897', 'CVE-2020-3899', 'CVE-2020-3900', 'CVE-2020-3901', 'CVE-2020-3902', 'CVE-2020-9802', 'CVE-2020-9803', 'CVE-2020-9805', 'CVE-2020-9806', 'CVE-2020-9807', 'CVE-2020-9843', 'CVE-2020-9850', 'CVE-2020-9862', 'CVE-2020-9893', 'CVE-2020-9894', 'CVE-2020-9895', 'CVE-2020-9915', 'CVE-2020-9925', 'CVE-2020-9952', 'CVE-2020-10018', 'CVE-2020-11793', 'CVE-2021-30666', 'CVE-2021-30761', 'CVE-2021-30762']},
{'reference':'webkit2gtk3-devel-2.28.4-1.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2019-8625', 'CVE-2019-8710', 'CVE-2019-8720', 'CVE-2019-8743', 'CVE-2019-8764', 'CVE-2019-8766', 'CVE-2019-8769', 'CVE-2019-8771', 'CVE-2019-8782', 'CVE-2019-8783', 'CVE-2019-8808', 'CVE-2019-8811', 'CVE-2019-8812', 'CVE-2019-8813', 'CVE-2019-8814', 'CVE-2019-8815', 'CVE-2019-8816', 'CVE-2019-8819', 'CVE-2019-8820', 'CVE-2019-8823', 'CVE-2019-8835', 'CVE-2019-8844', 'CVE-2019-8846', 'CVE-2020-3862', 'CVE-2020-3864', 'CVE-2020-3865', 'CVE-2020-3867', 'CVE-2020-3868', 'CVE-2020-3885', 'CVE-2020-3894', 'CVE-2020-3895', 'CVE-2020-3897', 'CVE-2020-3899', 'CVE-2020-3900', 'CVE-2020-3901', 'CVE-2020-3902', 'CVE-2020-9802', 'CVE-2020-9803', 'CVE-2020-9805', 'CVE-2020-9806', 'CVE-2020-9807', 'CVE-2020-9843', 'CVE-2020-9850', 'CVE-2020-9862', 'CVE-2020-9893', 'CVE-2020-9894', 'CVE-2020-9895', 'CVE-2020-9915', 'CVE-2020-9925', 'CVE-2020-9952', 'CVE-2020-10018', 'CVE-2020-11793', 'CVE-2021-30666', 'CVE-2021-30761', 'CVE-2021-30762']},
{'reference':'webkit2gtk3-jsc-2.28.4-1.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2019-8625', 'CVE-2019-8710', 'CVE-2019-8720', 'CVE-2019-8743', 'CVE-2019-8764', 'CVE-2019-8766', 'CVE-2019-8769', 'CVE-2019-8771', 'CVE-2019-8782', 'CVE-2019-8783', 'CVE-2019-8808', 'CVE-2019-8811', 'CVE-2019-8812', 'CVE-2019-8813', 'CVE-2019-8814', 'CVE-2019-8815', 'CVE-2019-8816', 'CVE-2019-8819', 'CVE-2019-8820', 'CVE-2019-8823', 'CVE-2019-8835', 'CVE-2019-8844', 'CVE-2019-8846', 'CVE-2020-3862', 'CVE-2020-3864', 'CVE-2020-3865', 'CVE-2020-3867', 'CVE-2020-3868', 'CVE-2020-3885', 'CVE-2020-3894', 'CVE-2020-3895', 'CVE-2020-3897', 'CVE-2020-3899', 'CVE-2020-3900', 'CVE-2020-3901', 'CVE-2020-3902', 'CVE-2020-9802', 'CVE-2020-9803', 'CVE-2020-9805', 'CVE-2020-9806', 'CVE-2020-9807', 'CVE-2020-9843', 'CVE-2020-9850', 'CVE-2020-9862', 'CVE-2020-9893', 'CVE-2020-9894', 'CVE-2020-9895', 'CVE-2020-9915', 'CVE-2020-9925', 'CVE-2020-9952', 'CVE-2020-10018', 'CVE-2020-11793', 'CVE-2021-30666', 'CVE-2021-30761', 'CVE-2021-30762']},
{'reference':'webkit2gtk3-jsc-devel-2.28.4-1.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'cves':['CVE-2019-8625', 'CVE-2019-8710', 'CVE-2019-8720', 'CVE-2019-8743', 'CVE-2019-8764', 'CVE-2019-8766', 'CVE-2019-8769', 'CVE-2019-8771', 'CVE-2019-8782', 'CVE-2019-8783', 'CVE-2019-8808', 'CVE-2019-8811', 'CVE-2019-8812', 'CVE-2019-8813', 'CVE-2019-8814', 'CVE-2019-8815', 'CVE-2019-8816', 'CVE-2019-8819', 'CVE-2019-8820', 'CVE-2019-8823', 'CVE-2019-8835', 'CVE-2019-8844', 'CVE-2019-8846', 'CVE-2020-3862', 'CVE-2020-3864', 'CVE-2020-3865', 'CVE-2020-3867', 'CVE-2020-3868', 'CVE-2020-3885', 'CVE-2020-3894', 'CVE-2020-3895', 'CVE-2020-3897', 'CVE-2020-3899', 'CVE-2020-3900', 'CVE-2020-3901', 'CVE-2020-3902', 'CVE-2020-9802', 'CVE-2020-9803', 'CVE-2020-9805', 'CVE-2020-9806', 'CVE-2020-9807', 'CVE-2020-9843', 'CVE-2020-9850', 'CVE-2020-9862', 'CVE-2020-9893', 'CVE-2020-9894', 'CVE-2020-9895', 'CVE-2020-9915', 'CVE-2020-9925', 'CVE-2020-9952', 'CVE-2020-10018', 'CVE-2020-11793', 'CVE-2021-30666', 'CVE-2021-30761', 'CVE-2021-30762']}
]
}
];
var applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);
if(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);
var flag = 0;
foreach var constraint_array ( constraints ) {
var repo_relative_urls = NULL;
if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];
foreach var pkg ( constraint_array['pkgs'] ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var epoch = NULL;
var allowmaj = NULL;
var exists_check = NULL;
var cves = NULL;
if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];
if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];
if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];
if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];
if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];
if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];
if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];
if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];
if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];
if (!empty_or_null(pkg['cves'])) cves = pkg['cves'];
if (reference &&
_release &&
rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&
(applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&
rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj, cves:cves)) flag++;
}
}
if (flag)
{
var extra = NULL;
if (isnull(applicable_repo_urls) || !applicable_repo_urls) extra = rpm_report_get() + redhat_report_repo_caveat();
else extra = rpm_report_get();
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : extra
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'LibRaw / LibRaw-devel / gnome-settings-daemon / webkit2gtk3 / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14391
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762
www.nessus.org/u?b7e37d18
www.nessus.org/u?dd0db1d1
access.redhat.com/errata/RHSA-2020:4451
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1207179
bugzilla.redhat.com/show_bug.cgi?id=1566027
bugzilla.redhat.com/show_bug.cgi?id=1569868
bugzilla.redhat.com/show_bug.cgi?id=1652178
bugzilla.redhat.com/show_bug.cgi?id=1656262
bugzilla.redhat.com/show_bug.cgi?id=1668895
bugzilla.redhat.com/show_bug.cgi?id=1692536
bugzilla.redhat.com/show_bug.cgi?id=1706008
bugzilla.redhat.com/show_bug.cgi?id=1706076
bugzilla.redhat.com/show_bug.cgi?id=1715845
bugzilla.redhat.com/show_bug.cgi?id=1719937
bugzilla.redhat.com/show_bug.cgi?id=1758891
bugzilla.redhat.com/show_bug.cgi?id=1775345
bugzilla.redhat.com/show_bug.cgi?id=1778579
bugzilla.redhat.com/show_bug.cgi?id=1779691
bugzilla.redhat.com/show_bug.cgi?id=1794045
bugzilla.redhat.com/show_bug.cgi?id=1804719
bugzilla.redhat.com/show_bug.cgi?id=1805929
bugzilla.redhat.com/show_bug.cgi?id=1811721
bugzilla.redhat.com/show_bug.cgi?id=1814820
bugzilla.redhat.com/show_bug.cgi?id=1816070
bugzilla.redhat.com/show_bug.cgi?id=1816678
bugzilla.redhat.com/show_bug.cgi?id=1816684
bugzilla.redhat.com/show_bug.cgi?id=1816686
bugzilla.redhat.com/show_bug.cgi?id=1817143
bugzilla.redhat.com/show_bug.cgi?id=1820759
bugzilla.redhat.com/show_bug.cgi?id=1820760
bugzilla.redhat.com/show_bug.cgi?id=1824362
bugzilla.redhat.com/show_bug.cgi?id=1827030
bugzilla.redhat.com/show_bug.cgi?id=1829369
bugzilla.redhat.com/show_bug.cgi?id=1832347
bugzilla.redhat.com/show_bug.cgi?id=1833158
bugzilla.redhat.com/show_bug.cgi?id=1837381
bugzilla.redhat.com/show_bug.cgi?id=1837406
bugzilla.redhat.com/show_bug.cgi?id=1837413
bugzilla.redhat.com/show_bug.cgi?id=1837648
bugzilla.redhat.com/show_bug.cgi?id=1840080
bugzilla.redhat.com/show_bug.cgi?id=1840788
bugzilla.redhat.com/show_bug.cgi?id=1843486
bugzilla.redhat.com/show_bug.cgi?id=1844578
bugzilla.redhat.com/show_bug.cgi?id=1846191
bugzilla.redhat.com/show_bug.cgi?id=1847051
bugzilla.redhat.com/show_bug.cgi?id=1847061
bugzilla.redhat.com/show_bug.cgi?id=1847062
bugzilla.redhat.com/show_bug.cgi?id=1847203
bugzilla.redhat.com/show_bug.cgi?id=1853477
bugzilla.redhat.com/show_bug.cgi?id=1854734
bugzilla.redhat.com/show_bug.cgi?id=1866332
bugzilla.redhat.com/show_bug.cgi?id=1868260
bugzilla.redhat.com/show_bug.cgi?id=1872270
bugzilla.redhat.com/show_bug.cgi?id=1873093
bugzilla.redhat.com/show_bug.cgi?id=1873963
bugzilla.redhat.com/show_bug.cgi?id=1876462
bugzilla.redhat.com/show_bug.cgi?id=1876463
bugzilla.redhat.com/show_bug.cgi?id=1876465
bugzilla.redhat.com/show_bug.cgi?id=1876468
bugzilla.redhat.com/show_bug.cgi?id=1876470
bugzilla.redhat.com/show_bug.cgi?id=1876472
bugzilla.redhat.com/show_bug.cgi?id=1876473
bugzilla.redhat.com/show_bug.cgi?id=1876476
bugzilla.redhat.com/show_bug.cgi?id=1876516
bugzilla.redhat.com/show_bug.cgi?id=1876518
bugzilla.redhat.com/show_bug.cgi?id=1876521
bugzilla.redhat.com/show_bug.cgi?id=1876522
bugzilla.redhat.com/show_bug.cgi?id=1876523
bugzilla.redhat.com/show_bug.cgi?id=1876536
bugzilla.redhat.com/show_bug.cgi?id=1876537
bugzilla.redhat.com/show_bug.cgi?id=1876540
bugzilla.redhat.com/show_bug.cgi?id=1876543
bugzilla.redhat.com/show_bug.cgi?id=1876545
bugzilla.redhat.com/show_bug.cgi?id=1876548
bugzilla.redhat.com/show_bug.cgi?id=1876549
bugzilla.redhat.com/show_bug.cgi?id=1876550
bugzilla.redhat.com/show_bug.cgi?id=1876552
bugzilla.redhat.com/show_bug.cgi?id=1876553
bugzilla.redhat.com/show_bug.cgi?id=1876554
bugzilla.redhat.com/show_bug.cgi?id=1876555
bugzilla.redhat.com/show_bug.cgi?id=1876556
bugzilla.redhat.com/show_bug.cgi?id=1876590
bugzilla.redhat.com/show_bug.cgi?id=1876591
bugzilla.redhat.com/show_bug.cgi?id=1876594
bugzilla.redhat.com/show_bug.cgi?id=1876607
bugzilla.redhat.com/show_bug.cgi?id=1876611
bugzilla.redhat.com/show_bug.cgi?id=1876617
bugzilla.redhat.com/show_bug.cgi?id=1876619
bugzilla.redhat.com/show_bug.cgi?id=1877853
bugzilla.redhat.com/show_bug.cgi?id=1879532
bugzilla.redhat.com/show_bug.cgi?id=1879535
bugzilla.redhat.com/show_bug.cgi?id=1879536
bugzilla.redhat.com/show_bug.cgi?id=1879538
bugzilla.redhat.com/show_bug.cgi?id=1879540
bugzilla.redhat.com/show_bug.cgi?id=1879541
bugzilla.redhat.com/show_bug.cgi?id=1879545
bugzilla.redhat.com/show_bug.cgi?id=1879557
bugzilla.redhat.com/show_bug.cgi?id=1879559
bugzilla.redhat.com/show_bug.cgi?id=1879563
bugzilla.redhat.com/show_bug.cgi?id=1879564
bugzilla.redhat.com/show_bug.cgi?id=1879566
bugzilla.redhat.com/show_bug.cgi?id=1879568
bugzilla.redhat.com/show_bug.cgi?id=1880339
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
98.1%