CVE-2024-26935 |
Description:
Nessus Plugin ID 215086 with High Severity
Synopsis
The remote Red Hat host is missing one or more security updates for kernel.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:1068 advisory. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL kernel package based on the guidance in RHSA-2025:1068.
Read more at https://www.tenable.com/plugins/nessus/215086
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215088 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn23.06.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1094 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn23.06 package based on the guidance in RHSA-2025:1094.
Read more at https://www.tenable.com/plugins/nessus/215088
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215089 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.09.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1085 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.09 package based on the guidance in RHSA-2025:1085.
Read more at https://www.tenable.com/plugins/nessus/215089
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215091 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.12.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1086 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.12 package based on the guidance in RHSA-2025:1086.
Read more at https://www.tenable.com/plugins/nessus/215091
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215093 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn23.06.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1088 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn23.06 package based on the guidance in RHSA-2025:1088.
Read more at https://www.tenable.com/plugins/nessus/215093
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215094 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn23.03.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1087 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn23.03 package based on the guidance in RHSA-2025:1087.
Read more at https://www.tenable.com/plugins/nessus/215094
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215095 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn22.06.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1090 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn22.06 package based on the guidance in RHSA-2025:1090.
Read more at https://www.tenable.com/plugins/nessus/215095
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215096 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn24.03.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1096 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn24.03 package based on the guidance in RHSA-2025:1096.
Read more at https://www.tenable.com/plugins/nessus/215096
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2025-0650 |
Description:
Nessus Plugin ID 215097 with High Severity
Synopsis
The remote Red Hat host is missing a security update for ovn23.03.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1093 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL ovn23.03 package based on the guidance in RHSA-2025:1093.
Read more at https://www.tenable.com/plugins/nessus/215097
EPSS Score: 0.05%
February 7th, 2025 (5 months ago)
|
CVE-2024-26935 |
Description:
Nessus Plugin ID 215098 with High Severity
Synopsis
The remote Red Hat host is missing one or more security updates for kernel-rt.
Description
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:1067 advisory. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the RHEL kernel-rt package based on the guidance in RHSA-2025:1067.
Read more at https://www.tenable.com/plugins/nessus/215098
February 7th, 2025 (5 months ago)
|