Language:
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2389491
https://bugzilla.redhat.com/show_bug.cgi?id=2393481
https://bugzilla.redhat.com/show_bug.cgi?id=2395267
https://bugzilla.redhat.com/show_bug.cgi?id=2395297
https://bugzilla.redhat.com/show_bug.cgi?id=2395322
https://bugzilla.redhat.com/show_bug.cgi?id=2395358
https://bugzilla.redhat.com/show_bug.cgi?id=2395420
https://bugzilla.redhat.com/show_bug.cgi?id=2395858
https://bugzilla.redhat.com/show_bug.cgi?id=2395880
https://bugzilla.redhat.com/show_bug.cgi?id=2396114
https://bugzilla.redhat.com/show_bug.cgi?id=2396152
https://bugzilla.redhat.com/show_bug.cgi?id=2396379
https://bugzilla.redhat.com/show_bug.cgi?id=2396417
https://bugzilla.redhat.com/show_bug.cgi?id=2396419
https://bugzilla.redhat.com/show_bug.cgi?id=2396538
https://bugzilla.redhat.com/show_bug.cgi?id=2400777
Severity: High
ID: 274937
File Name: redhat-RHSA-2025-21051.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 11/12/2025
Updated: 11/12/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Vendor Severity: Moderate
Risk Factor: High
Base Score: 7.3
Temporal Score: 5.4
Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:C
CVSS Score Source: CVE-2023-53305
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2023-53494
CPE: p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:kernel-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-modules, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel-matched, p-cpe:/a:redhat:enterprise_linux:kernel-devel-matched, p-cpe:/a:redhat:enterprise_linux:kernel-64k-debug, p-cpe:/a:redhat:enterprise_linux:kernel-64k-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-64k-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-64k-devel-matched, p-cpe:/a:redhat:enterprise_linux:kernel-64k-modules, p-cpe:/a:redhat:enterprise_linux:kernel-64k-modules-core, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-core, p-cpe:/a:redhat:enterprise_linux:kernel-debug-uki-virt, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-core, cpe:/o:redhat:rhel_e4s:9.2, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel-core, p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra, p-cpe:/a:redhat:enterprise_linux:python3-perf, p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel-matched, p-cpe:/a:redhat:enterprise_linux:kernel-64k, p-cpe:/a:redhat:enterprise_linux:kernel-64k-core, p-cpe:/a:redhat:enterprise_linux:kernel-64k-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-64k-debug-devel-matched, p-cpe:/a:redhat:enterprise_linux:kernel-64k-debug-modules-core, p-cpe:/a:redhat:enterprise_linux:kernel-64k-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-64k-devel, p-cpe:/a:redhat:enterprise_linux:kernel-64k-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-modules-core, p-cpe:/a:redhat:enterprise_linux:kernel-uki-virt, p-cpe:/a:redhat:enterprise_linux:rtla
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 11/12/2025
Vulnerability Publication Date: 9/4/2021
CVE: CVE-2022-50356, CVE-2022-50367, CVE-2022-50406, CVE-2023-53178, CVE-2023-53185, CVE-2023-53213, CVE-2023-53226, CVE-2023-53232, CVE-2023-53305, CVE-2023-53331, CVE-2023-53373, CVE-2023-53386, CVE-2023-53401, CVE-2023-53494, CVE-2025-38614, CVE-2025-39697