rhsa-2022_0190
Vulnerability from csaf_redhat
Published
2022-01-19 14:43
Modified
2024-11-15 09:44
Summary
Red Hat Security Advisory: Satellite 6.10.2 Async Bug Fix Update
Notes
Topic
Updated Satellite 6.10 packages that fix several bugs are now available for Red Hat Satellite.
Details
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Security Fix(es):
1927028 - candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290)
This update fixes the following bugs:
2016047 - Uploading a duplicate file fails with undefined local variable or method upload_href for #<Actions::Pulp3::Repository::CommitUpload:0x00000000134e3f00>
2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values
2027354 - Using Satellite with a proxy produces an SELinux alert
2027358 - Large CRL file operation causes OOM error in Candlepin
2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886
2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass
2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Satellite 6.10 packages that fix several bugs are now available for Red Hat Satellite.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.\n\nSecurity Fix(es):\n\n1927028 - candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290)\n\nThis update fixes the following bugs:\n\n2016047 - Uploading a duplicate file fails with undefined local variable or method upload_href for #\u003cActions::Pulp3::Repository::CommitUpload:0x00000000134e3f00\u003e\n2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column \"subscription_id\" contains null values\n2027354 - Using Satellite with a proxy produces an SELinux alert\n2027358 - Large CRL file operation causes OOM error in Candlepin\n2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886\n2030445 - Failed at scanning for repository: undefined method `resolve_substitutions\u0027 for nil:NilClass\n2030448 - Capsule sync task failed to refresh repo that doesn\u0027t have feed url with \"bad argument (expected URI object or URI string)\" error\n\nUsers of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0190", "url": "https://access.redhat.com/errata/RHSA-2022:0190" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1927028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927028" }, { "category": "external", "summary": "2016047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016047" }, { "category": "external", "summary": "2027347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027347" }, { "category": "external", "summary": "2027354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027354" }, { "category": "external", "summary": "2027358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027358" }, { "category": "external", "summary": "2027817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027817" }, { "category": "external", "summary": "2030445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030445" }, { "category": "external", "summary": "2030448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030448" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0190.json" } ], "title": "Red Hat Security Advisory: Satellite 6.10.2 Async Bug Fix Update", "tracking": { "current_release_date": "2024-11-15T09:44:09+00:00", "generator": { "date": "2024-11-15T09:44:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0190", "initial_release_date": "2022-01-19T14:43:30+00:00", "revision_history": [ { "date": "2022-01-19T14:43:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-19T14:43:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:44:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite Capsule 6.10", "product": { "name": "Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610", "product_identification_helper": { "cpe": "cpe:/a:redhat:satellite_capsule:6.10::el7" } } }, { "category": "product_name", "name": "Red Hat Satellite 6.10", "product": { "name": "Red Hat Satellite 6.10", "product_id": "7Server-Satellite610", "product_identification_helper": { "cpe": "cpe:/a:redhat:satellite:6.10::el7" } } } ], "category": "product_family", "name": "Red Hat Satellite 6" }, { "branches": [ { "category": "product_version", "name": "pulpcore-selinux-0:1.2.7-1.el7pc.src", "product": { "name": "pulpcore-selinux-0:1.2.7-1.el7pc.src", "product_id": "pulpcore-selinux-0:1.2.7-1.el7pc.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulpcore-selinux@1.2.7-1.el7pc?arch=src" } } }, { "category": "product_version", "name": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src", "product": { "name": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src", "product_id": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tfm-rubygem-katello@4.1.1.42-1.el7sat?arch=src" } } }, { "category": "product_version", "name": "satellite-0:6.10.2-1.el7sat.src", "product": { "name": "satellite-0:6.10.2-1.el7sat.src", "product_id": "satellite-0:6.10.2-1.el7sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/satellite@6.10.2-1.el7sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "product": { "name": "pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "product_id": "pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulpcore-selinux@1.2.7-1.el7pc?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch", "product": { "name": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch", "product_id": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tfm-rubygem-katello@4.1.1.42-1.el7sat?arch=noarch" } } }, { "category": "product_version", "name": "satellite-capsule-0:6.10.2-1.el7sat.noarch", "product": { "name": "satellite-capsule-0:6.10.2-1.el7sat.noarch", "product_id": "satellite-capsule-0:6.10.2-1.el7sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/satellite-capsule@6.10.2-1.el7sat?arch=noarch" } } }, { "category": "product_version", "name": "satellite-common-0:6.10.2-1.el7sat.noarch", "product": { "name": "satellite-common-0:6.10.2-1.el7sat.noarch", "product_id": "satellite-common-0:6.10.2-1.el7sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/satellite-common@6.10.2-1.el7sat?arch=noarch" } } }, { "category": "product_version", "name": "satellite-0:6.10.2-1.el7sat.noarch", "product": { "name": "satellite-0:6.10.2-1.el7sat.noarch", "product_id": "satellite-0:6.10.2-1.el7sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/satellite@6.10.2-1.el7sat?arch=noarch" } } }, { "category": "product_version", "name": "satellite-cli-0:6.10.2-1.el7sat.noarch", "product": { "name": "satellite-cli-0:6.10.2-1.el7sat.noarch", "product_id": "satellite-cli-0:6.10.2-1.el7sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/satellite-cli@6.10.2-1.el7sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pulpcore-selinux-0:1.2.7-1.el7pc.src as a component of Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610:pulpcore-selinux-0:1.2.7-1.el7pc.src" }, "product_reference": "pulpcore-selinux-0:1.2.7-1.el7pc.src", "relates_to_product_reference": "7Server-Capsule610" }, { "category": "default_component_of", "full_product_name": { "name": "pulpcore-selinux-0:1.2.7-1.el7pc.x86_64 as a component of Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610:pulpcore-selinux-0:1.2.7-1.el7pc.x86_64" }, "product_reference": "pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "relates_to_product_reference": "7Server-Capsule610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Capsule610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-0:6.10.2-1.el7sat.src as a component of Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.src" }, "product_reference": "satellite-0:6.10.2-1.el7sat.src", "relates_to_product_reference": "7Server-Capsule610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-capsule-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610:satellite-capsule-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-capsule-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Capsule610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-cli-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610:satellite-cli-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-cli-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Capsule610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-common-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite Capsule 6.10", "product_id": "7Server-Capsule610:satellite-common-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-common-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Capsule610" }, { "category": "default_component_of", "full_product_name": { "name": "pulpcore-selinux-0:1.2.7-1.el7pc.src as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:pulpcore-selinux-0:1.2.7-1.el7pc.src" }, "product_reference": "pulpcore-selinux-0:1.2.7-1.el7pc.src", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "pulpcore-selinux-0:1.2.7-1.el7pc.x86_64 as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:pulpcore-selinux-0:1.2.7-1.el7pc.x86_64" }, "product_reference": "pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-0:6.10.2-1.el7sat.src as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.src" }, "product_reference": "satellite-0:6.10.2-1.el7sat.src", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-capsule-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:satellite-capsule-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-capsule-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-cli-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:satellite-cli-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-cli-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "satellite-common-0:6.10.2-1.el7sat.noarch as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:satellite-common-0:6.10.2-1.el7sat.noarch" }, "product_reference": "satellite-common-0:6.10.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch" }, "product_reference": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch", "relates_to_product_reference": "7Server-Satellite610" }, { "category": "default_component_of", "full_product_name": { "name": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src as a component of Red Hat Satellite 6.10", "product_id": "7Server-Satellite610:tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src" }, "product_reference": "tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src", "relates_to_product_reference": "7Server-Satellite610" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-21290", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-Capsule610:pulpcore-selinux-0:1.2.7-1.el7pc.src", "7Server-Capsule610:pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "7Server-Satellite610:pulpcore-selinux-0:1.2.7-1.el7pc.src", "7Server-Satellite610:pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "7Server-Satellite610:tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch", "7Server-Satellite610:tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1927028" } ], "notes": [ { "category": "description", "text": "In Netty there is a vulnerability on Unix-like systems involving an insecure temp file. When netty\u0027s multipart decoders are used, a local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: Information disclosure via the local system temporary directory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.src", "7Server-Capsule610:satellite-capsule-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-cli-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-common-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.src", "7Server-Satellite610:satellite-capsule-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-cli-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-common-0:6.10.2-1.el7sat.noarch" ], "known_not_affected": [ "7Server-Capsule610:pulpcore-selinux-0:1.2.7-1.el7pc.src", "7Server-Capsule610:pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "7Server-Satellite610:pulpcore-selinux-0:1.2.7-1.el7pc.src", "7Server-Satellite610:pulpcore-selinux-0:1.2.7-1.el7pc.x86_64", "7Server-Satellite610:tfm-rubygem-katello-0:4.1.1.42-1.el7sat.noarch", "7Server-Satellite610:tfm-rubygem-katello-0:4.1.1.42-1.el7sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21290" }, { "category": "external", "summary": "RHBZ#1927028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21290", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21290" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21290", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21290" } ], "release_date": "2021-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-19T14:43:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor detailed instructions how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_satellite/6.10/html/upgrading_and_updating_red_hat_satellite/updating_satellite_server_capsule_server_and_content_hosts", "product_ids": [ "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.src", "7Server-Capsule610:satellite-capsule-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-cli-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-common-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.src", "7Server-Satellite610:satellite-capsule-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-cli-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-common-0:6.10.2-1.el7sat.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0190" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-0:6.10.2-1.el7sat.src", "7Server-Capsule610:satellite-capsule-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-cli-0:6.10.2-1.el7sat.noarch", "7Server-Capsule610:satellite-common-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-0:6.10.2-1.el7sat.src", "7Server-Satellite610:satellite-capsule-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-cli-0:6.10.2-1.el7sat.noarch", "7Server-Satellite610:satellite-common-0:6.10.2-1.el7sat.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: Information disclosure via the local system temporary directory" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.