Risk | Low |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2024-25739 CVE-2024-27056 CVE-2024-35855 CVE-2021-47386 CVE-2023-52803 CVE-2024-42322 CVE-2024-43871 CVE-2024-47745 CVE-2025-21927 |
CWE-ID | CWE-754 CWE-399 CWE-416 CWE-476 CWE-401 CWE-20 CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Red Hat Enterprise Linux for x86_64 - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server - AUS Operating systems & Components / Operating system Red Hat Enterprise Linux for IBM z Systems - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, little endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for ARM 64 - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions Operating systems & Components / Operating system package or component kernel (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU92399
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-25739
CWE-ID:
CWE-754 - Improper Check for Unusual or Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper check for unusual or exceptional conditions error within the ubi_read_volume_table() function in drivers/mtd/ubi/vtbl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92983
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27056
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iwl_mvm_sta_ensure_queue() function in drivers/net/wireless/intel/iwlwifi/mvm/sta.c, within the __iwl_mvm_suspend() function in drivers/net/wireless/intel/iwlwifi/mvm/d3.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90163
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35855
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_ventry_activity_get() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90503
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47386
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the w83791d_detect_subclients() function in drivers/hwmon/w83791d.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90079
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52803
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rpc_clnt_remove_pipedir() and rpc_setup_pipedir() functions in net/sunrpc/clnt.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96189
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42322
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ip_vs_add_service() function in net/netfilter/ipvs/ip_vs_ctl.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the EXPORT_SYMBOL_GPL() function in drivers/base/devres.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47745
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the SYSCALL_DEFINE5() function in mm/mmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106844
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21927
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the nvme_tcp_queue_id() and nvme_tcp_recv_pdu() functions in drivers/nvme/host/tcp.c. A local user can escalate privileges on the system.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.67.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:4509
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.