Bug 2186440
Summary: | CVE-2022-25147 is marked with CVSS score 9.8, whereas RHEL is marked it as "Moderate" | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Gandhimathy <gandhi.srini> |
Component: | apr-util | Assignee: | Luboš Uhliarik <luhliari> |
Status: | CLOSED DUPLICATE | QA Contact: | rhel-cs-infra-services-qe <rhel-cs-infra-services-qe> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 8.7 | CC: | jorton, pdelbell |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-09 08:57:38 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Gandhimathy
2023-04-13 09:42:42 UTC
Hi, Thank you for reaching via RH Bugzilla. For questions related to Red Hat CVE pages, I'd suggest you to reach via secalert, which would be easier for us to work on your ticket and maintain the response. In summary, Red Hat Impact does not follow the CVSS score, although they should correlate sometimes, it's not the standard. In common sense, it's expected to be a higher impact when the CVSS is higher. Please, check more about how it normally is by accessing this link[1]. For this one specifically, it was reported by Apache and you can check more on [2] this link is found under external references in Customer Portal. When there's a normal expectation divergence similar to this case there should, in most cases, contain a statement explaining the reasons about it. In this case, it was decided to follow Apache's rating as they're the reporting CNA for this CVE. Have a good day. Patrick -- [1] https://access.redhat.com/security/updates/classification [2] https://lists.apache.org/thread/np5gjqlohc4f62lr09vrn61vl44cylh8 This vulnerability has now been reassessed as Important impact by Red Hat Product Security - we will be proceeding with errata work. As Patrick suggests please contact ProdSec or Red Hat Support directly if you have queries about CVE rating or errata. You can track further updates via the vulnerability tracker at bug 2169652. *** This bug has been marked as a duplicate of bug 2169652 *** Looking for the fix at RHEL UBI 8.7.x level |