CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-0650

Description: Nessus Plugin ID 215078 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn22.03. Description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1083 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn22.03 package based on the guidance in RHSA-2025:1083. Read more at https://www.tenable.com/plugins/nessus/215078

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215080 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn24.09. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1097 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn24.09 package based on the guidance in RHSA-2025:1097. Read more at https://www.tenable.com/plugins/nessus/215080

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215082 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn22.03. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1089 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn22.03 package based on the guidance in RHSA-2025:1089. Read more at https://www.tenable.com/plugins/nessus/215082

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215083 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn22.12. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1092 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn22.12 package based on the guidance in RHSA-2025:1092. Read more at https://www.tenable.com/plugins/nessus/215083

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215084 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn22.06. Description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1084 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn22.06 package based on the guidance in RHSA-2025:1084. Read more at https://www.tenable.com/plugins/nessus/215084

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2024-11218

Description: Nessus Plugin ID 215085 with High Severity Synopsis The remote Red Hat host is missing a security update for OpenShift Container Platform 4.17.15. Description The remote Redhat Enterprise Linux 8 / 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:0878 advisory. Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.17.15. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHSA-2025:0876 Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.17/updating/updating_a_cluster/updating-cluster-cli.htm...

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2024-26935

Description: Nessus Plugin ID 215086 with High Severity Synopsis The remote Red Hat host is missing one or more security updates for kernel. Description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:1068 advisory. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Solution Update the RHEL kernel package based on the guidance in RHSA-2025:1068. Read more at https://www.tenable.com/plugins/nessus/215086
Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215088 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn23.06. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1094 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn23.06 package based on the guidance in RHSA-2025:1094. Read more at https://www.tenable.com/plugins/nessus/215088

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215089 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn22.09. Description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1085 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn22.09 package based on the guidance in RHSA-2025:1085. Read more at https://www.tenable.com/plugins/nessus/215089

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215091 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn22.12. Description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1086 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn22.12 package based on the guidance in RHSA-2025:1086. Read more at https://www.tenable.com/plugins/nessus/215091

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)