| Risk | Low |
| Patch available | YES |
| Number of vulnerabilities | 6 |
| CVE-ID | CVE-2023-52606 CVE-2024-26645 CVE-2024-26921 CVE-2024-27042 CVE-2024-35930 CVE-2024-36933 |
| CWE-ID | CWE-119 CWE-682 CWE-191 CWE-125 CWE-401 CWE-908 |
| Exploitation vector | Local |
| Public exploit | N/A |
| Vulnerable software |
Red Hat Enterprise Linux for x86_64 - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server - AUS Operating systems & Components / Operating system Red Hat Enterprise Linux for IBM z Systems - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, little endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for ARM 64 - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions Operating systems & Components / Operating system package or component kernel (Red Hat package) Operating systems & Components / Operating system package or component |
| Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU87343
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52606
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the fp/vmx code in powerpc/lib/sstep.c. A local user can trigger memory corruption and perform a denial of service (DoS) attack.
Install updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.72.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:8796
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93762
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26645
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the __tracing_map_insert() function in kernel/trace/tracing_map.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.72.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:8796
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91672
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26921
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nf_ct_frag6_queue() and nf_ct_frag6_gather() functions in net/ipv6/netfilter/nf_conntrack_reasm.c, within the ip_frag_queue() and ip_defrag() functions in net/ipv4/ip_fragment.c, within the FRAG_CB(), inet_frag_queue_insert(), inet_frag_reasm_prepare(), EXPORT_SYMBOL() and inet_frag_reasm_finish() functions in net/ipv4/inet_fragment.c. A local user can execute arbitrary code.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.72.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:8796
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90315
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27042
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the amdgpu_discovery_reg_base_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.72.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:8796
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35930
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the lpfc_rcv_padisc() function in drivers/scsi/lpfc/lpfc_nportdisc.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.72.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:8796
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90862
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36933
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the EXPORT_SYMBOL_GPL() and nsh_gso_segment() functions in net/nsh/nsh.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server - AUS: 9.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 9.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 9.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 9.4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 9.4
kernel (Red Hat package): before 5.14.0-427.72.1.el9_4
CPE2.3https://access.redhat.com/errata/RHSA-2025:8796
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.