Bug 2186440

Summary: CVE-2022-25147 is marked with CVSS score 9.8, whereas RHEL is marked it as "Moderate"
Product: Red Hat Enterprise Linux 8 Reporter: Gandhimathy <gandhi.srini>
Component: apr-utilAssignee: Luboš Uhliarik <luhliari>
Status: CLOSED DUPLICATE QA Contact: rhel-cs-infra-services-qe <rhel-cs-infra-services-qe>
Severity: high Docs Contact:
Priority: unspecified    
Version: 8.7CC: jorton, pdelbell
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-09 08:57:38 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Gandhimathy 2023-04-13 09:42:42 UTC
Description of problem:
CVE-2022-25147 is marked with CVSS score 9.8, whereas RHEL is marked it as "Moderate".  

The information provided here - https://access.redhat.com/security/cve/cve-2022-25147, mentions that the impact is reported as 'Moderate'.  

It is very important for us to understand "why it is marked as Moderate ?"

The reason behind considering it as "Moderate" will help in responding to our customer.

Looking for RHEL team to provide the reason why it is marked as "Moderate" for this high CVSS Score.

Comment 1 Patrick Del Bello 2023-04-13 15:42:58 UTC
Hi,

Thank you for reaching via RH Bugzilla. For questions related to Red Hat CVE pages, I'd suggest you to reach via secalert, which would be easier for us to work on your ticket and maintain the response.
In summary, Red Hat Impact does not follow the CVSS score, although they should correlate sometimes, it's not the standard. In common sense, it's expected to be a higher impact when the CVSS is higher. Please, check more about how it normally is by accessing this link[1]. For this one specifically, it was reported by Apache and you can check more on [2] this link is found under external references in Customer Portal. 

When there's a normal expectation divergence similar to this case there should, in most cases, contain a statement explaining the reasons about it. In this case, it was decided to follow Apache's rating as they're the reporting CNA for this CVE. 

Have a good day.
Patrick

--


[1] https://access.redhat.com/security/updates/classification
[2] https://lists.apache.org/thread/np5gjqlohc4f62lr09vrn61vl44cylh8

Comment 2 Joe Orton 2023-05-09 08:57:38 UTC
This vulnerability has now been reassessed as Important impact by Red Hat Product Security - we will be proceeding with errata work.

As Patrick suggests please contact ProdSec or Red Hat Support directly if you have queries about CVE rating or errata. You can track further updates via the vulnerability tracker at bug 2169652.

*** This bug has been marked as a duplicate of bug 2169652 ***

Comment 3 Gandhimathy 2023-05-11 02:25:27 UTC
Looking for the fix at RHEL UBI 8.7.x level