Language:
http://www.nessus.org/u?3fbe9687
http://www.nessus.org/u?7c54d416
https://access.redhat.com/errata/RHSA-2015:1845
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1027723
https://bugzilla.redhat.com/show_bug.cgi?id=1064265
https://bugzilla.redhat.com/show_bug.cgi?id=1076033
https://bugzilla.redhat.com/show_bug.cgi?id=1091936
https://bugzilla.redhat.com/show_bug.cgi?id=1134288
https://bugzilla.redhat.com/show_bug.cgi?id=1178100
https://bugzilla.redhat.com/show_bug.cgi?id=1213893
https://bugzilla.redhat.com/show_bug.cgi?id=1215816
https://bugzilla.redhat.com/show_bug.cgi?id=1225452
https://bugzilla.redhat.com/show_bug.cgi?id=1226665
https://bugzilla.redhat.com/show_bug.cgi?id=1226817
https://bugzilla.redhat.com/show_bug.cgi?id=1227724
https://bugzilla.redhat.com/show_bug.cgi?id=1227759
https://bugzilla.redhat.com/show_bug.cgi?id=1228135
https://bugzilla.redhat.com/show_bug.cgi?id=1228158
https://bugzilla.redhat.com/show_bug.cgi?id=1229606
https://bugzilla.redhat.com/show_bug.cgi?id=1229621
https://bugzilla.redhat.com/show_bug.cgi?id=1231080
https://bugzilla.redhat.com/show_bug.cgi?id=1232216
https://bugzilla.redhat.com/show_bug.cgi?id=1232569
https://bugzilla.redhat.com/show_bug.cgi?id=1234213
https://bugzilla.redhat.com/show_bug.cgi?id=1234399
https://bugzilla.redhat.com/show_bug.cgi?id=1234610
https://bugzilla.redhat.com/show_bug.cgi?id=1234708
https://bugzilla.redhat.com/show_bug.cgi?id=1235182
https://bugzilla.redhat.com/show_bug.cgi?id=1235571
https://bugzilla.redhat.com/show_bug.cgi?id=1235971
https://bugzilla.redhat.com/show_bug.cgi?id=1236038
https://bugzilla.redhat.com/show_bug.cgi?id=1236546
https://bugzilla.redhat.com/show_bug.cgi?id=1236672
https://bugzilla.redhat.com/show_bug.cgi?id=1236990
https://bugzilla.redhat.com/show_bug.cgi?id=1238070
https://bugzilla.redhat.com/show_bug.cgi?id=1238071
https://bugzilla.redhat.com/show_bug.cgi?id=1238111
https://bugzilla.redhat.com/show_bug.cgi?id=1238116
https://bugzilla.redhat.com/show_bug.cgi?id=1238118
https://bugzilla.redhat.com/show_bug.cgi?id=1238147
https://bugzilla.redhat.com/show_bug.cgi?id=1238171
https://bugzilla.redhat.com/show_bug.cgi?id=1238398
https://bugzilla.redhat.com/show_bug.cgi?id=1238977
https://bugzilla.redhat.com/show_bug.cgi?id=1239021
https://bugzilla.redhat.com/show_bug.cgi?id=1239075
https://bugzilla.redhat.com/show_bug.cgi?id=1240614
https://bugzilla.redhat.com/show_bug.cgi?id=1240657
https://bugzilla.redhat.com/show_bug.cgi?id=1241385
https://bugzilla.redhat.com/show_bug.cgi?id=1241761
https://bugzilla.redhat.com/show_bug.cgi?id=1241807
https://bugzilla.redhat.com/show_bug.cgi?id=1241862
https://bugzilla.redhat.com/show_bug.cgi?id=1241871
https://bugzilla.redhat.com/show_bug.cgi?id=1242803
https://bugzilla.redhat.com/show_bug.cgi?id=1243542
https://bugzilla.redhat.com/show_bug.cgi?id=1243722
https://bugzilla.redhat.com/show_bug.cgi?id=1243886
https://bugzilla.redhat.com/show_bug.cgi?id=1244415
https://bugzilla.redhat.com/show_bug.cgi?id=1244527
https://bugzilla.redhat.com/show_bug.cgi?id=1245162
https://bugzilla.redhat.com/show_bug.cgi?id=1245165
https://bugzilla.redhat.com/show_bug.cgi?id=1245536
https://bugzilla.redhat.com/show_bug.cgi?id=1245542
https://bugzilla.redhat.com/show_bug.cgi?id=1245897
https://bugzilla.redhat.com/show_bug.cgi?id=1245915
https://bugzilla.redhat.com/show_bug.cgi?id=1245919
https://bugzilla.redhat.com/show_bug.cgi?id=1245924
https://bugzilla.redhat.com/show_bug.cgi?id=1246946
https://bugzilla.redhat.com/show_bug.cgi?id=1247445
https://bugzilla.redhat.com/show_bug.cgi?id=1247537
https://bugzilla.redhat.com/show_bug.cgi?id=1248899
https://bugzilla.redhat.com/show_bug.cgi?id=1249989
https://bugzilla.redhat.com/show_bug.cgi?id=1250453
https://bugzilla.redhat.com/show_bug.cgi?id=1250821
https://bugzilla.redhat.com/show_bug.cgi?id=1251360
https://bugzilla.redhat.com/show_bug.cgi?id=1251925
https://bugzilla.redhat.com/show_bug.cgi?id=1253141
https://bugzilla.redhat.com/show_bug.cgi?id=1254432
https://bugzilla.redhat.com/show_bug.cgi?id=1254514
https://bugzilla.redhat.com/show_bug.cgi?id=1254866
https://bugzilla.redhat.com/show_bug.cgi?id=1254991
https://bugzilla.redhat.com/show_bug.cgi?id=1255015
https://bugzilla.redhat.com/show_bug.cgi?id=1255308
https://bugzilla.redhat.com/show_bug.cgi?id=1255471
https://bugzilla.redhat.com/show_bug.cgi?id=1257099
https://bugzilla.redhat.com/show_bug.cgi?id=1257162
https://bugzilla.redhat.com/show_bug.cgi?id=1257468
https://bugzilla.redhat.com/show_bug.cgi?id=1257509
https://bugzilla.redhat.com/show_bug.cgi?id=1257525
https://bugzilla.redhat.com/show_bug.cgi?id=1258434
https://bugzilla.redhat.com/show_bug.cgi?id=1258810
https://bugzilla.redhat.com/show_bug.cgi?id=1258821
https://bugzilla.redhat.com/show_bug.cgi?id=1259750
https://bugzilla.redhat.com/show_bug.cgi?id=1260086
https://bugzilla.redhat.com/show_bug.cgi?id=1260982
https://bugzilla.redhat.com/show_bug.cgi?id=1262236
https://bugzilla.redhat.com/show_bug.cgi?id=1262291
https://bugzilla.redhat.com/show_bug.cgi?id=1263094
Severity: Medium
ID: 86306
File Name: redhat-RHSA-2015-1845.nasl
Version: 2.8
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 10/7/2015
Updated: 4/15/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.6
Vendor Severity: Moderate
Risk Factor: Medium
Base Score: 5.5
Temporal Score: 4.8
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P
CVSS Score Source: CVE-2015-1856
Risk Factor: Medium
Base Score: 6.5
Temporal Score: 6.2
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2014-8177
CPE: p-cpe:/a:redhat:enterprise_linux:glusterfs-cli, p-cpe:/a:redhat:enterprise_linux:glusterfs-ganesha, p-cpe:/a:redhat:enterprise_linux:glusterfs-devel, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:vdsm-tests, p-cpe:/a:redhat:enterprise_linux:glusterfs-api, p-cpe:/a:redhat:enterprise_linux:glusterfs, p-cpe:/a:redhat:enterprise_linux:gstatus, p-cpe:/a:redhat:enterprise_linux:openstack-swift-container, p-cpe:/a:redhat:enterprise_linux:gluster-nagios-addons, p-cpe:/a:redhat:enterprise_linux:glusterfs-client-xlators, p-cpe:/a:redhat:enterprise_linux:vdsm-python, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-openstacknet, p-cpe:/a:redhat:enterprise_linux:vdsm-jsonrpc, p-cpe:/a:redhat:enterprise_linux:swiftonfile, p-cpe:/a:redhat:enterprise_linux:glusterfs-rdma, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-gluster, p-cpe:/a:redhat:enterprise_linux:nagios-server-addons, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-qemucmdline, p-cpe:/a:redhat:enterprise_linux:glusterfs-server, p-cpe:/a:redhat:enterprise_linux:openstack-swift-object, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-ethtool-options, p-cpe:/a:redhat:enterprise_linux:openstack-swift-account, p-cpe:/a:redhat:enterprise_linux:vdsm-xmlrpc, p-cpe:/a:redhat:enterprise_linux:glusterfs-api-devel, p-cpe:/a:redhat:enterprise_linux:glusterfs-fuse, p-cpe:/a:redhat:enterprise_linux:openstack-swift, p-cpe:/a:redhat:enterprise_linux:vdsm-gluster, p-cpe:/a:redhat:enterprise_linux:vdsm-reg, p-cpe:/a:redhat:enterprise_linux:redhat-storage-server, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-faqemu, p-cpe:/a:redhat:enterprise_linux:glusterfs-geo-replication, p-cpe:/a:redhat:enterprise_linux:vdsm, p-cpe:/a:redhat:enterprise_linux:nfs-ganesha, p-cpe:/a:redhat:enterprise_linux:vdsm-debug-plugin, p-cpe:/a:redhat:enterprise_linux:vdsm-yajsonrpc, p-cpe:/a:redhat:enterprise_linux:python-gluster, p-cpe:/a:redhat:enterprise_linux:gluster-nagios-common, p-cpe:/a:redhat:enterprise_linux:glusterfs-libs, p-cpe:/a:redhat:enterprise_linux:gdeploy, p-cpe:/a:redhat:enterprise_linux:vdsm-python-zombiereaper, p-cpe:/a:redhat:enterprise_linux:openstack-swift-doc, p-cpe:/a:redhat:enterprise_linux:openstack-swift-proxy, p-cpe:/a:redhat:enterprise_linux:vdsm-cli
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/5/2015
Vulnerability Publication Date: 8/21/2015
CVE: CVE-2014-8177, CVE-2015-1856
BID: 76979
RHSA: 2015:1845