rhsa-2011_1000
Vulnerability from csaf_redhat
Published
2011-07-21 09:22
Modified
2024-11-14 10:50
Summary
Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update
Notes
Topic
An updated rgmanager package that fixes one security issue, several bugs,
and adds multiple enhancements is now available for Red Hat Enterprise
Linux 5.
The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The rgmanager package contains the Red Hat Resource Group Manager, which
provides the ability to create and manage high-availability server
applications in the event of system downtime.
It was discovered that certain resource agent scripts set the
LD_LIBRARY_PATH environment variable to an insecure value containing empty
path elements. A local user able to trick a user running those scripts to
run them while working from an attacker-writable directory could use this
flaw to escalate their privileges via a specially-crafted dynamic library.
(CVE-2010-3389)
Red Hat would like to thank Raphael Geissert for reporting this issue.
This update also fixes the following bugs:
* The failover domain "nofailback" option was not honored if a service was
in the "starting" state. This bug has been fixed. (BZ#669440)
* PID files with white spaces in the file name are now handled correctly.
(BZ#632704)
* The /usr/sbin/rhev-check.sh script can now be used from within Cron.
(BZ#634225)
* The clustat utility now reports the correct version. (BZ#654160)
* The oracledb.sh agent now attempts to try the "shutdown immediate"
command instead of using the "shutdown abort" command. (BZ#633992)
* The SAPInstance and SAPDatabase scripts now use proper directory name
quoting so they no longer collide with directory names like "/u".
(BZ#637154)
* The clufindhostname utility now returns the correct value in all cases.
(BZ#592613)
* The nfsclient resource agent now handles paths with trailing slashes
correctly. (BZ#592624)
* The last owner of a service is now reported correctly after a failover.
(BZ#610483)
* The /usr/share/cluster/fs.sh script no longer runs the "quotaoff" command
if quotas were not configured. (BZ#637678)
* The "listen" line in the /etc/httpd/conf/httpd.conf file generated by the
Apache resource agent is now correct. (BZ#675739)
* The tomcat-5 resource agent no longer generates incorrect configurations.
(BZ#637802)
* The time required to stop an NFS resource when the server is unavailable
has been reduced. (BZ#678494)
* When using exclusive prioritization, a higher priority service now
preempts a lower priority service after status check failures. (BZ#680256)
* The postgres-8 resource agent now correctly detects failed start
operations. (BZ#663827)
* The handling of reference counts passed by rgmanager to resource agents
now works properly, as expected. (BZ#692771)
As well, this update adds the following enhancements:
* It is now possible to disable updates to static routes by the IP resource
agent. (BZ#620700)
* It is now possible to use XFS as a file system within a cluster service.
(BZ#661893)
* It is now possible to use the "clustat" command as a non-root user, so
long as that user is in the "root" group. (BZ#510300)
* It is now possible to migrate virtual machines when central processing is
enabled. (BZ#525271)
* The rgmanager init script will now delay after stopping services in order
to allow time for other nodes to restart them. (BZ#619468)
* The handling of failed independent subtrees has been corrected.
(BZ#711521)
All users of Red Hat Resource Group Manager are advised to upgrade to this
updated package, which contains backported patches to correct these issues
and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rgmanager package that fixes one security issue, several bugs,\nand adds multiple enhancements is now available for Red Hat Enterprise\nLinux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The rgmanager package contains the Red Hat Resource Group Manager, which\nprovides the ability to create and manage high-availability server\napplications in the event of system downtime.\n\nIt was discovered that certain resource agent scripts set the\nLD_LIBRARY_PATH environment variable to an insecure value containing empty\npath elements. A local user able to trick a user running those scripts to\nrun them while working from an attacker-writable directory could use this\nflaw to escalate their privileges via a specially-crafted dynamic library.\n(CVE-2010-3389)\n\nRed Hat would like to thank Raphael Geissert for reporting this issue.\n\nThis update also fixes the following bugs:\n\n* The failover domain \"nofailback\" option was not honored if a service was\nin the \"starting\" state. This bug has been fixed. (BZ#669440)\n\n* PID files with white spaces in the file name are now handled correctly.\n(BZ#632704)\n\n* The /usr/sbin/rhev-check.sh script can now be used from within Cron.\n(BZ#634225)\n\n* The clustat utility now reports the correct version. (BZ#654160)\n\n* The oracledb.sh agent now attempts to try the \"shutdown immediate\"\ncommand instead of using the \"shutdown abort\" command. (BZ#633992)\n\n* The SAPInstance and SAPDatabase scripts now use proper directory name\nquoting so they no longer collide with directory names like \"/u\".\n(BZ#637154)\n\n* The clufindhostname utility now returns the correct value in all cases.\n(BZ#592613)\n\n* The nfsclient resource agent now handles paths with trailing slashes\ncorrectly. (BZ#592624)\n\n* The last owner of a service is now reported correctly after a failover.\n(BZ#610483)\n\n* The /usr/share/cluster/fs.sh script no longer runs the \"quotaoff\" command\nif quotas were not configured. (BZ#637678)\n\n* The \"listen\" line in the /etc/httpd/conf/httpd.conf file generated by the\nApache resource agent is now correct. (BZ#675739)\n\n* The tomcat-5 resource agent no longer generates incorrect configurations.\n(BZ#637802)\n\n* The time required to stop an NFS resource when the server is unavailable\nhas been reduced. (BZ#678494)\n\n* When using exclusive prioritization, a higher priority service now\npreempts a lower priority service after status check failures. (BZ#680256)\n\n* The postgres-8 resource agent now correctly detects failed start\noperations. (BZ#663827)\n\n* The handling of reference counts passed by rgmanager to resource agents\nnow works properly, as expected. (BZ#692771)\n\nAs well, this update adds the following enhancements:\n\n* It is now possible to disable updates to static routes by the IP resource\nagent. (BZ#620700)\n\n* It is now possible to use XFS as a file system within a cluster service.\n(BZ#661893)\n\n* It is now possible to use the \"clustat\" command as a non-root user, so\nlong as that user is in the \"root\" group. (BZ#510300)\n\n* It is now possible to migrate virtual machines when central processing is\nenabled. (BZ#525271)\n\n* The rgmanager init script will now delay after stopping services in order\nto allow time for other nodes to restart them. (BZ#619468)\n\n* The handling of failed independent subtrees has been corrected.\n(BZ#711521)\n\nAll users of Red Hat Resource Group Manager are advised to upgrade to this\nupdated package, which contains backported patches to correct these issues\nand add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1000", "url": "https://access.redhat.com/errata/RHSA-2011:1000" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "592613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592613" }, { "category": "external", "summary": "592624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592624" }, { "category": "external", "summary": "610483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=610483" }, { "category": "external", "summary": "632704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632704" }, { "category": "external", "summary": "634225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634225" }, { "category": "external", "summary": "637154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637154" }, { "category": "external", "summary": "637678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637678" }, { "category": "external", "summary": "637802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637802" }, { "category": "external", "summary": "639044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639044" }, { "category": "external", "summary": "654160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=654160" }, { "category": "external", "summary": "661893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=661893" }, { "category": "external", "summary": "663827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663827" }, { "category": "external", "summary": "669440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=669440" }, { "category": "external", "summary": "675739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675739" }, { "category": "external", "summary": "678494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678494" }, { "category": "external", "summary": "680256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680256" }, { "category": "external", "summary": "711521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711521" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1000.json" } ], "title": "Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-14T10:50:08+00:00", "generator": { "date": "2024-11-14T10:50:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:1000", "initial_release_date": "2011-07-21T09:22:00+00:00", "revision_history": [ { "date": "2011-07-21T09:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-07-21T06:43:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:50:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rgmanager-0:2.0.52-21.el5.ia64", "product": { "name": "rgmanager-0:2.0.52-21.el5.ia64", "product_id": "rgmanager-0:2.0.52-21.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager@2.0.52-21.el5?arch=ia64" } } }, { "category": "product_version", "name": "rgmanager-debuginfo-0:2.0.52-21.el5.ia64", "product": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.ia64", "product_id": "rgmanager-debuginfo-0:2.0.52-21.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-21.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "rgmanager-0:2.0.52-21.el5.ppc", "product": { "name": "rgmanager-0:2.0.52-21.el5.ppc", "product_id": "rgmanager-0:2.0.52-21.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager@2.0.52-21.el5?arch=ppc" } } }, { "category": "product_version", "name": "rgmanager-debuginfo-0:2.0.52-21.el5.ppc", "product": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.ppc", "product_id": "rgmanager-debuginfo-0:2.0.52-21.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-21.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "rgmanager-0:2.0.52-21.el5.src", "product": { "name": "rgmanager-0:2.0.52-21.el5.src", "product_id": "rgmanager-0:2.0.52-21.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager@2.0.52-21.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rgmanager-0:2.0.52-21.el5.x86_64", "product": { "name": "rgmanager-0:2.0.52-21.el5.x86_64", "product_id": "rgmanager-0:2.0.52-21.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager@2.0.52-21.el5?arch=x86_64" } } }, { "category": "product_version", "name": "rgmanager-debuginfo-0:2.0.52-21.el5.x86_64", "product": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.x86_64", "product_id": "rgmanager-debuginfo-0:2.0.52-21.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-21.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rgmanager-0:2.0.52-21.el5.i386", "product": { "name": "rgmanager-0:2.0.52-21.el5.i386", "product_id": "rgmanager-0:2.0.52-21.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager@2.0.52-21.el5?arch=i386" } } }, { "category": "product_version", "name": "rgmanager-debuginfo-0:2.0.52-21.el5.i386", "product": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.i386", "product_id": "rgmanager-debuginfo-0:2.0.52-21.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-21.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rgmanager-0:2.0.52-21.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-0:2.0.52-21.el5.i386" }, "product_reference": "rgmanager-0:2.0.52-21.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-0:2.0.52-21.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ia64" }, "product_reference": "rgmanager-0:2.0.52-21.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-0:2.0.52-21.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ppc" }, "product_reference": "rgmanager-0:2.0.52-21.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-0:2.0.52-21.el5.src as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-0:2.0.52-21.el5.src" }, "product_reference": "rgmanager-0:2.0.52-21.el5.src", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-0:2.0.52-21.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-0:2.0.52-21.el5.x86_64" }, "product_reference": "rgmanager-0:2.0.52-21.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.i386" }, "product_reference": "rgmanager-debuginfo-0:2.0.52-21.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ia64" }, "product_reference": "rgmanager-debuginfo-0:2.0.52-21.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ppc" }, "product_reference": "rgmanager-debuginfo-0:2.0.52-21.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "rgmanager-debuginfo-0:2.0.52-21.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.x86_64" }, "product_reference": "rgmanager-debuginfo-0:2.0.52-21.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Raphael Geissert" ] } ], "cve": "CVE-2010-3389", "discovery_date": "2010-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639044" } ], "notes": [ { "category": "description", "text": "The (1) SAPDatabase and (2) SAPInstance scripts in OCF Resource Agents (aka resource-agents or cluster-agents) 1.0.3 in Linux-HA place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "rgmanager: insecure library loading vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Cluster:rgmanager-0:2.0.52-21.el5.i386", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ia64", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ppc", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.src", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.x86_64", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.i386", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ia64", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ppc", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3389" }, { "category": "external", "summary": "RHBZ#639044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3389" } ], "release_date": "2010-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-07-21T09:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Server-Cluster:rgmanager-0:2.0.52-21.el5.i386", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ia64", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ppc", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.src", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.x86_64", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.i386", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ia64", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ppc", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1000" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Cluster:rgmanager-0:2.0.52-21.el5.i386", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ia64", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.ppc", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.src", "5Server-Cluster:rgmanager-0:2.0.52-21.el5.x86_64", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.i386", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ia64", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.ppc", "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-21.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "rgmanager: insecure library loading vulnerability" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.