RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2186440 - CVE-2022-25147 is marked with CVSS score 9.8, whereas RHEL is marked it as "Moderate"
Summary: CVE-2022-25147 is marked with CVSS score 9.8, whereas RHEL is marked it as "M...
Keywords:
Status: CLOSED DUPLICATE of bug 2169652
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: apr-util
Version: 8.7
Hardware: Unspecified
OS: Linux
unspecified
high
Target Milestone: rc
: ---
Assignee: Luboš Uhliarik
QA Contact: rhel-cs-infra-services-qe
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-04-13 09:42 UTC by Gandhimathy
Modified: 2023-05-11 02:25 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-05-09 08:57:38 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-154611 0 None None None 2023-04-13 16:33:50 UTC

Description Gandhimathy 2023-04-13 09:42:42 UTC
Description of problem:
CVE-2022-25147 is marked with CVSS score 9.8, whereas RHEL is marked it as "Moderate".  

The information provided here - https://access.redhat.com/security/cve/cve-2022-25147, mentions that the impact is reported as 'Moderate'.  

It is very important for us to understand "why it is marked as Moderate ?"

The reason behind considering it as "Moderate" will help in responding to our customer.

Looking for RHEL team to provide the reason why it is marked as "Moderate" for this high CVSS Score.

Comment 1 Patrick Del Bello 2023-04-13 15:42:58 UTC
Hi,

Thank you for reaching via RH Bugzilla. For questions related to Red Hat CVE pages, I'd suggest you to reach via secalert, which would be easier for us to work on your ticket and maintain the response.
In summary, Red Hat Impact does not follow the CVSS score, although they should correlate sometimes, it's not the standard. In common sense, it's expected to be a higher impact when the CVSS is higher. Please, check more about how it normally is by accessing this link[1]. For this one specifically, it was reported by Apache and you can check more on [2] this link is found under external references in Customer Portal. 

When there's a normal expectation divergence similar to this case there should, in most cases, contain a statement explaining the reasons about it. In this case, it was decided to follow Apache's rating as they're the reporting CNA for this CVE. 

Have a good day.
Patrick

--


[1] https://access.redhat.com/security/updates/classification
[2] https://lists.apache.org/thread/np5gjqlohc4f62lr09vrn61vl44cylh8

Comment 2 Joe Orton 2023-05-09 08:57:38 UTC
This vulnerability has now been reassessed as Important impact by Red Hat Product Security - we will be proceeding with errata work.

As Patrick suggests please contact ProdSec or Red Hat Support directly if you have queries about CVE rating or errata. You can track further updates via the vulnerability tracker at bug 2169652.

*** This bug has been marked as a duplicate of bug 2169652 ***

Comment 3 Gandhimathy 2023-05-11 02:25:27 UTC
Looking for the fix at RHEL UBI 8.7.x level


Note You need to log in before you can comment on or make changes to this bug.