https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2252788
https://bugzilla.redhat.com/show_bug.cgi?id=2270948
https://bugzilla.redhat.com/show_bug.cgi?id=2284356
https://bugzilla.redhat.com/show_bug.cgi?id=2312113
https://bugzilla.redhat.com/show_bug.cgi?id=2314387
https://bugzilla.redhat.com/show_bug.cgi?id=2315596
https://bugzilla.redhat.com/show_bug.cgi?id=2315885
https://bugzilla.redhat.com/show_bug.cgi?id=2321291
https://bugzilla.redhat.com/show_bug.cgi?id=2348763
https://bugzilla.redhat.com/show_bug.cgi?id=2348935
https://bugzilla.redhat.com/show_bug.cgi?id=2348945
https://bugzilla.redhat.com/show_bug.cgi?id=2348968
https://bugzilla.redhat.com/show_bug.cgi?id=2348970
https://bugzilla.redhat.com/show_bug.cgi?id=2349078
https://bugzilla.redhat.com/show_bug.cgi?id=2349723
https://bugzilla.redhat.com/show_bug.cgi?id=2351271
https://bugzilla.redhat.com/show_bug.cgi?id=2351465
https://bugzilla.redhat.com/show_bug.cgi?id=2352965
https://bugzilla.redhat.com/show_bug.cgi?id=2356050
https://bugzilla.redhat.com/show_bug.cgi?id=2356542
https://bugzilla.redhat.com/show_bug.cgi?id=2357889
https://bugzilla.redhat.com/show_bug.cgi?id=2358123
https://bugzilla.redhat.com/show_bug.cgi?id=2358562
https://bugzilla.redhat.com/show_bug.cgi?id=2360911
https://bugzilla.redhat.com/show_bug.cgi?id=2362258
Severity: Critical
ID: 235495
File Name: redhat-RHSA-2025-4664.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 5/7/2025
Updated: 5/7/2025
Supported Sensors: Continuous Assessment, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Vendor Severity: Important
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2024-24790
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Risk Factor: Critical
Base Score: 9.3
Threat Score: 8.9
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score Source: CVE-2023-48795
CPE: p-cpe:/a:redhat:enterprise_linux:ceph-mib, p-cpe:/a:redhat:enterprise_linux:python3-ceph-argparse, p-cpe:/a:redhat:enterprise_linux:librgw2, p-cpe:/a:redhat:enterprise_linux:libradospp-devel, p-cpe:/a:redhat:enterprise_linux:python3-ceph-common, p-cpe:/a:redhat:enterprise_linux:libradosstriper1, p-cpe:/a:redhat:enterprise_linux:librgw-devel, p-cpe:/a:redhat:enterprise_linux:cephadm, p-cpe:/a:redhat:enterprise_linux:librados-devel, p-cpe:/a:redhat:enterprise_linux:librbd-devel, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:liboath, p-cpe:/a:redhat:enterprise_linux:python3-cephfs, p-cpe:/a:redhat:enterprise_linux:ceph-common, p-cpe:/a:redhat:enterprise_linux:ceph-resource-agents, p-cpe:/a:redhat:enterprise_linux:cephfs-top, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:librados2, p-cpe:/a:redhat:enterprise_linux:libcephfs2, p-cpe:/a:redhat:enterprise_linux:ceph, p-cpe:/a:redhat:enterprise_linux:python3-rados, p-cpe:/a:redhat:enterprise_linux:rbd-nbd, p-cpe:/a:redhat:enterprise_linux:librbd1, p-cpe:/a:redhat:enterprise_linux:ceph-base, p-cpe:/a:redhat:enterprise_linux:ceph-fuse, p-cpe:/a:redhat:enterprise_linux:ceph-immutable-object-cache, p-cpe:/a:redhat:enterprise_linux:python3-rbd, p-cpe:/a:redhat:enterprise_linux:ceph-selinux, p-cpe:/a:redhat:enterprise_linux:python3-rgw, p-cpe:/a:redhat:enterprise_linux:libcephfs-devel, p-cpe:/a:redhat:enterprise_linux:oath-toolkit
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/7/2025
Vulnerability Publication Date: 2/14/2023
CVE: CVE-2023-23934, CVE-2023-25577, CVE-2023-46446, CVE-2023-48795, CVE-2024-24790, CVE-2024-34069, CVE-2024-42353, CVE-2024-47191, CVE-2024-48916