rhsa-2022_8598
Vulnerability from csaf_redhat
Published
2022-11-22 15:04
Modified
2024-11-22 20:21
Summary
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1]

Notes

Topic
An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.5.2), redhat-virtualization-host (4.5.2), redhat-virtualization-host-productimg (4.5.2). (BZ#2070049, BZ#2093195) Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) * bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) * bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) * device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.5.2), redhat-virtualization-host (4.5.2), redhat-virtualization-host-productimg (4.5.2). (BZ#2070049, BZ#2093195)\n\nSecurity Fix(es):\n\n* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\n* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)\n\n* device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:8598",
        "url": "https://access.redhat.com/errata/RHSA-2022:8598"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2127936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127936"
      },
      {
        "category": "external",
        "summary": "2128601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601"
      },
      {
        "category": "external",
        "summary": "2128602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602"
      },
      {
        "category": "external",
        "summary": "2128986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128986"
      },
      {
        "category": "external",
        "summary": "2130769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130769"
      },
      {
        "category": "external",
        "summary": "2133988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133988"
      },
      {
        "category": "external",
        "summary": "2135610",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135610"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8598.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1]",
    "tracking": {
      "current_release_date": "2024-11-22T20:21:48+00:00",
      "generator": {
        "date": "2024-11-22T20:21:48+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:8598",
      "initial_release_date": "2022-11-22T15:04:29+00:00",
      "revision_history": [
        {
          "date": "2022-11-22T15:04:29+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-22T15:04:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T20:21:48+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "8Base-RHV-HypervisorBuild-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                  "product_id": "8Base-RHV-Hypervisor-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
                "product": {
                  "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
                  "product_id": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.3-1.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.3-1.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
                  "product_id": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.3-202211170828_8.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64",
                  "product_id": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.3-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.3-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64",
                  "product_id": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.3-202211170828_8.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.3-1.el8ev?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src"
        },
        "product_reference": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
        },
        "product_reference": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Anonymous"
          ],
          "organization": "Trend Micro Zero Day Initiative",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2022-3515",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2022-10-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2135610"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libksba: integer overflow may lead to remote code execution",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3515"
        },
        {
          "category": "external",
          "summary": "RHBZ#2135610",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135610"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3515",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3515",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3515"
        },
        {
          "category": "external",
          "summary": "https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html",
          "url": "https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html"
        }
      ],
      "release_date": "2022-10-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-22T15:04:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8598"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "libksba: integer overflow may lead to remote code execution"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maksym Odinintsev"
          ]
        }
      ],
      "cve": "CVE-2022-38177",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-09-21T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2128601"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "bind: memory leak in ECDSA DNSSEC verification code",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-38177"
        },
        {
          "category": "external",
          "summary": "RHBZ#2128601",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177"
        },
        {
          "category": "external",
          "summary": "https://kb.isc.org/docs/cve-2022-38177",
          "url": "https://kb.isc.org/docs/cve-2022-38177"
        }
      ],
      "release_date": "2022-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-22T15:04:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8598"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "bind: memory leak in ECDSA DNSSEC verification code"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maksym Odinintsev"
          ]
        }
      ],
      "cve": "CVE-2022-38178",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2022-09-21T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2128602"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "bind: memory leaks in EdDSA DNSSEC verification code",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-38178"
        },
        {
          "category": "external",
          "summary": "RHBZ#2128602",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178"
        },
        {
          "category": "external",
          "summary": "https://kb.isc.org/docs/cve-2022-38178",
          "url": "https://kb.isc.org/docs/cve-2022-38178"
        }
      ],
      "release_date": "2022-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-22T15:04:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8598"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "bind: memory leaks in EdDSA DNSSEC verification code"
    },
    {
      "cve": "CVE-2022-40674",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-09-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2130769"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in expat. With this flaw, it is possible to create a situation in which parsing is suspended while substituting in an internal entity so that XML_ResumeParser directly uses the internalEntityProcessor as its processor. If the subsequent parse includes some unclosed tags, this will return without calling storeRawNames to ensure that the raw versions of the tag names are stored in memory other than the parse buffer itself. Issues occur if the parse buffer is changed or reallocated (for example, if processing a file line by line), problems occur. Using this vulnerability in the doContent function allows an attacker to triage a denial of service or potentially arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: a use-after-free in the doContent function in xmlparse.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as important because this flaw can easily compromise the confidentiality, integrity, or availability of resources but a successful attack can not execute arbitrary code, or allow remote users to cause a denial of service because attack complexity is high and depends on conditions beyond the attacker\u0027s control.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-40674"
        },
        {
          "category": "external",
          "summary": "RHBZ#2130769",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130769"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40674",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40674",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40674"
        },
        {
          "category": "external",
          "summary": "https://blog.hartwork.org/posts/expat-2-4-9-released/",
          "url": "https://blog.hartwork.org/posts/expat-2-4-9-released/"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-2vq2-xc55-3j5m",
          "url": "https://github.com/advisories/GHSA-2vq2-xc55-3j5m"
        }
      ],
      "release_date": "2022-09-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-22T15:04:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8598"
        },
        {
          "category": "workaround",
          "details": "There is no known mitigation other than restricting applications using the expat library from processing XML content. Please update the affected packages as soon as possible.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "expat: a use-after-free in the doContent function in xmlparse.c"
    },
    {
      "cve": "CVE-2022-41974",
      "cwe": {
        "id": "CWE-285",
        "name": "Improper Authorization"
      },
      "discovery_date": "2022-10-12T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2133988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41974"
        },
        {
          "category": "external",
          "summary": "RHBZ#2133988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41974",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41974"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41974",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41974"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt",
          "url": "https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt"
        }
      ],
      "release_date": "2022-10-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-22T15:04:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8598"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.