![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.822855 |
Category: | Fedora Local Security Checks |
Title: | Fedora: Security Advisory for sysstat (FEDORA-2022-dbe48a4bc7) |
Summary: | The remote host is missing an update for the 'sysstat'; package(s) announced via the FEDORA-2022-dbe48a4bc7 advisory. |
Description: | Summary: The remote host is missing an update for the 'sysstat' package(s) announced via the FEDORA-2022-dbe48a4bc7 advisory. Vulnerability Insight: The sysstat package contains the sar, sadf, mpstat, iostat, tapestat, pidstat, cifsiostat and sa tools for Linux. The sar command collects and reports system activity information. The information collected by sar can be saved in a file in a binary format for future inspection. The statistics reported by sar concern I/O transfer rates, paging activity, process-related activities, interrupts, network activity, memory and swap space utilization, CPU utilization, kernel activities and TTY statistics, among others. Both UP and SMP machines are fully supported. The sadf command may be used to display data collected by sar in various formats (CSV, PCP, XML, etc.). The iostat command reports CPU utilization and I/O statistics for disks. The tapestat command reports statistics for tapes connected to the system. The mpstat command reports global and per-processor statistics. The pidstat command reports statistics for Linux tasks (processes). The cifsiostat command reports I/O statistics for CIFS file systems. Affected Software/OS: 'sysstat' package(s) on Fedora 36. Solution: Please install the updated package(s). CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-39377 https://github.com/sysstat/sysstat/security/advisories/GHSA-q8r6-g56f-9w7x https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7X6WKTODOUDV6M3HZMASYNZP6EM4N7W4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6F26ALXWYHT4LN2AHPZM34OQEXTJE3JZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHUVUDIVDJZ7AVXD3XX3NBXXXKPOKN3N/ https://security.gentoo.org/glsa/202211-07 https://lists.debian.org/debian-lts-announce/2022/11/msg00014.html |
Copyright | Copyright (C) 2022 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |