rhsa-2018_1524
Vulnerability from csaf_redhat
Published
2018-05-15 17:40
Modified
2024-11-05 20:32
Summary
Red Hat Security Advisory: redhat-virtualization-host bug fix and enhancement update
Notes
Topic
Updated redhat-virtualization-host packages that fix several bugs and add various enhancements are now available.
Details
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Includes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897.
A list of bugs fixed in this update is available in the Technical Notes book: https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.2/html/technical_notes/
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated redhat-virtualization-host packages that fix several bugs and add various enhancements are now available.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nIncludes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897.\n\nA list of bugs fixed in this update is available in the Technical Notes book: https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.2/html/technical_notes/", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1524", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1357247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357247" }, { "category": "external", "summary": "1374007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374007" }, { "category": "external", "summary": "1420068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420068" }, { "category": "external", "summary": "1422676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422676" }, { "category": "external", "summary": "1429485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429485" }, { "category": "external", "summary": "1433394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433394" }, { "category": "external", "summary": "1443965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443965" }, { "category": "external", "summary": "1454536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1454536" }, { "category": "external", "summary": "1474268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474268" }, { "category": "external", "summary": "1489567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489567" }, { "category": "external", "summary": "1501161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501161" }, { "category": "external", "summary": "1502920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502920" }, { "category": "external", "summary": "1503148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503148" }, { "category": "external", "summary": "1516123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516123" }, { "category": "external", "summary": "1534855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534855" }, { "category": "external", "summary": "1535791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535791" }, { "category": "external", "summary": "1542833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542833" }, { "category": "external", "summary": "1547864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547864" }, { "category": "external", "summary": "1549630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549630" }, { "category": "external", "summary": "1554186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554186" }, { "category": "external", "summary": "1555243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555243" }, { "category": "external", "summary": "1555254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555254" }, { "category": "external", "summary": "1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "1561258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561258" }, { "category": "external", "summary": "1563530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563530" }, { "category": "external", "summary": "1565497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565497" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "1571134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571134" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1524.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-05T20:32:47+00:00", "generator": { "date": "2024-11-05T20:32:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2018:1524", "initial_release_date": "2018-05-15T17:40:52+00:00", "revision_history": [ { "date": "2018-05-15T17:40:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-15T17:40:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T20:32:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_id": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.2.0-0.20170814.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-3.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180508.0.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_id": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng@4.2.0-0.20170814.0.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=src" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product_id": "imgbased-0:1.0.16-0.1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_id": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180508.0.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src" }, "product_reference": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src" }, "product_reference": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch" }, "product_reference": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "John Strunk" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1088", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558721" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in gluster snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that have, or have previously had, Gluster volume snapshot scheduling enabled from the CLI. Red Hat Enterprise Virtualization supports volume snapshot scheduling from the Web UI, which uses a distinct mechanism that is not subject to this vulnerability. VM snapshots are not impacted by this flaw. For more information, please see the Vulnerability Article linked under External References.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6, and 7 because only gluster client is shipped in these products. CVE-2018-1088 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "category": "external", "summary": "RHBZ#1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "To limit exposure of gluster server nodes : \n\n1. gluster server should be on LAN and not reachable from public networks. \n2. Use gluster auth.allow and auth.reject. \n3. Use TLS certificates between gluster server nodes and clients. \n\nCaveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm" ], "organization": "Google Security Team" } ], "cve": "CVE-2018-1111", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2018-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567974" } ], "notes": [ { "category": "description", "text": "A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Red Hat Enterprise Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has been made aware of a vulnerability affecting the DHCP client packages as shipped with Red Hat Enterprise Linux 6 and 7. This vulnerability CVE-2018-1111 was rated as having a security impact of Critical. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.\n\nRed Hat Enterprise Virtualization 4.1 includes the vulnerable components, but the default configuration is not impacted because NetworkManager is turned off in the Management Appliance, and not used in conjunction with DHCP in the Hypervisor. Customers can still obtain the updated packages from Red Hat Enterprise Linux channels using `yum update`, or upgrade to Red Hat Enterprise Virtualization 4.2, which includes the fixed packages.\n\nRed Hat Enterprise Virtualization 3.6 is not vulnerable as it does not use DHCP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1111" }, { "category": "external", "summary": "RHBZ#1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1111", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3442151", "url": "https://access.redhat.com/security/vulnerabilities/3442151" } ], "release_date": "2018-05-15T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "Please access https://access.redhat.com/security/vulnerabilities/3442151 for information on how to mitigate this issue.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.