Language:
https://bugzilla.redhat.com/show_bug.cgi?id=2335767
https://bugzilla.redhat.com/show_bug.cgi?id=2342266
https://bugzilla.redhat.com/show_bug.cgi?id=2342728
https://bugzilla.redhat.com/show_bug.cgi?id=2342750
https://bugzilla.redhat.com/show_bug.cgi?id=2342981
https://bugzilla.redhat.com/show_bug.cgi?id=2343514
https://bugzilla.redhat.com/show_bug.cgi?id=2345560
https://bugzilla.redhat.com/show_bug.cgi?id=2345723
https://bugzilla.redhat.com/show_bug.cgi?id=2346194
https://bugzilla.redhat.com/show_bug.cgi?id=2346828
https://bugzilla.redhat.com/show_bug.cgi?id=2347559
https://bugzilla.redhat.com/show_bug.cgi?id=2348396
https://bugzilla.redhat.com/show_bug.cgi?id=2348462
https://bugzilla.redhat.com/show_bug.cgi?id=2348701
https://bugzilla.redhat.com/show_bug.cgi?id=2348728
https://bugzilla.redhat.com/show_bug.cgi?id=2349083
https://bugzilla.redhat.com/show_bug.cgi?id=2349100
https://bugzilla.redhat.com/show_bug.cgi?id=2349102
https://bugzilla.redhat.com/show_bug.cgi?id=2349928
https://bugzilla.redhat.com/show_bug.cgi?id=2350879
https://bugzilla.redhat.com/show_bug.cgi?id=2351003
https://bugzilla.redhat.com/show_bug.cgi?id=2351038
https://bugzilla.redhat.com/show_bug.cgi?id=2351127
https://bugzilla.redhat.com/show_bug.cgi?id=2351205
https://bugzilla.redhat.com/show_bug.cgi?id=2351464
https://bugzilla.redhat.com/show_bug.cgi?id=2351823
https://bugzilla.redhat.com/show_bug.cgi?id=2352781
https://bugzilla.redhat.com/show_bug.cgi?id=2353296
https://bugzilla.redhat.com/show_bug.cgi?id=2353378
https://bugzilla.redhat.com/show_bug.cgi?id=2355038
https://bugzilla.redhat.com/show_bug.cgi?id=2355056
https://bugzilla.redhat.com/show_bug.cgi?id=2355689
https://bugzilla.redhat.com/show_bug.cgi?id=2355790
http://www.nessus.org/u?bda78133
https://access.redhat.com/errata/RHSA-2025:3635
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2252403
https://bugzilla.redhat.com/show_bug.cgi?id=2313281
Severity: High
ID: 234269
File Name: redhat-RHSA-2025-3635.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 4/13/2025
Updated: 4/13/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.0
Vendor Severity: Important
Risk Factor: Medium
Base Score: 6.2
Temporal Score: 4.6
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:N
CVSS Score Source: CVE-2024-47191
Risk Factor: High
Base Score: 7.1
Temporal Score: 6.2
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:ceph-mib, p-cpe:/a:redhat:enterprise_linux:python3-ceph-argparse, p-cpe:/a:redhat:enterprise_linux:librgw2, p-cpe:/a:redhat:enterprise_linux:libradospp-devel, p-cpe:/a:redhat:enterprise_linux:python3-ceph-common, p-cpe:/a:redhat:enterprise_linux:libradosstriper1, p-cpe:/a:redhat:enterprise_linux:librgw-devel, p-cpe:/a:redhat:enterprise_linux:cephadm, p-cpe:/a:redhat:enterprise_linux:librados-devel, p-cpe:/a:redhat:enterprise_linux:librbd-devel, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:libcephfs-proxy2, p-cpe:/a:redhat:enterprise_linux:liboath, p-cpe:/a:redhat:enterprise_linux:python3-cephfs, p-cpe:/a:redhat:enterprise_linux:ceph-common, p-cpe:/a:redhat:enterprise_linux:ceph-resource-agents, p-cpe:/a:redhat:enterprise_linux:cephfs-top, p-cpe:/a:redhat:enterprise_linux:librados2, p-cpe:/a:redhat:enterprise_linux:libcephfs2, p-cpe:/a:redhat:enterprise_linux:ceph, p-cpe:/a:redhat:enterprise_linux:python3-rados, p-cpe:/a:redhat:enterprise_linux:rbd-nbd, p-cpe:/a:redhat:enterprise_linux:librbd1, p-cpe:/a:redhat:enterprise_linux:ceph-base, p-cpe:/a:redhat:enterprise_linux:ceph-fuse, p-cpe:/a:redhat:enterprise_linux:ceph-immutable-object-cache, p-cpe:/a:redhat:enterprise_linux:python3-rbd, p-cpe:/a:redhat:enterprise_linux:ceph-selinux, p-cpe:/a:redhat:enterprise_linux:python3-rgw, p-cpe:/a:redhat:enterprise_linux:libcephfs-devel, p-cpe:/a:redhat:enterprise_linux:oath-toolkit
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 4/7/2025
Vulnerability Publication Date: 10/8/2024
CVE: CVE-2024-47191