Bug 2057447
Summary: | CVE-2022-24407 cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands [ovirt-4.4] | ||
---|---|---|---|
Product: | [oVirt] ovirt-node | Reporter: | Sandro Bonazzola <sbonazzo> |
Component: | Included packages | Assignee: | Sandro Bonazzola <sbonazzo> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Sandro Bonazzola <sbonazzo> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 4.4.10 | CC: | bugs, cshao, gsuckevi |
Target Milestone: | ovirt-4.4.10-2 | Keywords: | Security, SecurityTracking |
Target Release: | 4.4.10.2 | Flags: | sbonazzo:
ovirt-4.4+
sbonazzo: planning_ack? sbonazzo: devel_ack+ cshao: testing_ack+ |
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | cyrus-sasl-2.1.27-6.el8_5 | Doc Type: | No Doc Update |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-03-10 09:54:05 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | Node | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2055846 | ||
Bug Blocks: | 2055326 |
Description
Sandro Bonazzola
2022-02-23 12:09:33 UTC
Waiting for the fix to be available: https://koji.mbox.centos.org/koji/packageinfo?packageID=22 Hi Sandro, Is this bug a duplicate of https://bugzilla.redhat.com/show_bug.cgi?id=2057312 ? Thanks. (In reply to Guilherme de Almeida Suckevicz from comment #2) > Hi Sandro, > > Is this bug a duplicate of > https://bugzilla.redhat.com/show_bug.cgi?id=2057312 ? > > Thanks. No, bug #2057312 is tracking RHV-H 4.4, this one is tracking oVirt Node 4.4, the upstream community build. https://koji.mbox.centos.org/koji/buildinfo?buildID=21253 landed on http://mirror.centos.org/centos/8-stream/AppStream/x86_64/os/Packages/ |