CVE-2025-0650 |
Description:
Nessus Plugin ID 215078 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.03.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1083 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.03 package based on the guidance in RHSA-2025:1083.
Read more at https://www.tenable.com/plugins/nessus/215078
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215080 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn24.09.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1097 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn24.09 package based on the guidance in RHSA-2025:1097.
Read more at https://www.tenable.com/plugins/nessus/215080
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215082 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.03.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1089 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.03 package based on the guidance in RHSA-2025:1089.
Read more at https://www.tenable.com/plugins/nessus/215082
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215083 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.12.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1092 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.12 package based on the guidance in RHSA-2025:1092.
Read more at https://www.tenable.com/plugins/nessus/215083
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215084 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.06.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1084 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.06 package based on the guidance in RHSA-2025:1084.
Read more at https://www.tenable.com/plugins/nessus/215084
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2024-11218 |
Description:
Nessus Plugin ID 215085 with High Severity
Synopsis
The remote Red Hat host is missing a security update for OpenShift Container Platform 4.17.15.
Description
The remote Redhat Enterprise Linux 8 / 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:0878 advisory. Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.17.15. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHSA-2025:0876 Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.17/updating/updating_a_cluster/updating-cluster-cli.htm...
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2024-26935 |
Description:
Nessus Plugin ID 215086 with High Severity
Synopsis
The remote Red Hat host is missing one or more security updates for kernel.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:1068 advisory. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL kernel package based on the guidance in RHSA-2025:1068.
Read more at https://www.tenable.com/plugins/nessus/215086
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215088 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn23.06.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1094 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn23.06 package based on the guidance in RHSA-2025:1094.
Read more at https://www.tenable.com/plugins/nessus/215088
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215089 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.09.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1085 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.09 package based on the guidance in RHSA-2025:1085.
Read more at https://www.tenable.com/plugins/nessus/215089
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215091 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.12.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1086 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.12 package based on the guidance in RHSA-2025:1086.
Read more at https://www.tenable.com/plugins/nessus/215091
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|