RHSA-2025:23234
Vulnerability from csaf_redhat - Published: 2025-12-16 00:56 - Updated: 2025-12-17 08:37Summary
Red Hat Security Advisory: Red Hat Ceph Storage
Notes
Topic
A new version of Red Hat build of Ceph Storage has been released
Details
The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 7.1.
This release updates to the latest version.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 7.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23234",
"url": "https://access.redhat.com/errata/RHSA-2025:23234"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4598",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9714",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23234.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2025-12-17T08:37:41+00:00",
"generator": {
"date": "2025-12-17T08:37:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:23234",
"initial_release_date": "2025-12-16T00:56:50+00:00",
"revision_history": [
{
"date": "2025-12-16T00:56:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-16T12:30:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T08:37:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 7",
"product": {
"name": "Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:7::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Ad9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Ac746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3Accaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ae468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e?arch=arm64\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3A7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3Acfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Af4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4598",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"discovery_date": "2025-05-29T19:04:54.578000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369242"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original\u0027s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner\u0027s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original\u0027s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated as having a severity of Moderate due to the complexity to exploit this flaw. The attacker needs to setup a way to win the race condition and have an unprivileged local account to successfully exploit this vulnerability.\n\nBy default Red Hat Enterprise Linux 8 doesn\u0027t allow systemd-coredump to create dumps of SUID programs as the /proc/sys/fs/suid_dumpable is set to 0, disabling by default this capability.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-364: Signal Handler Race Condition vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and strong input validation detect unsafe input that could influence execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous monitoring, supports rapid identification of exploitation attempts. Process isolation and Kubernetes orchestration minimize the risk of concurrent execution conflicts and contain potential impacts. Executable search paths are limited to trusted, explicitly defined directories, reducing the risk of executing malicious files. Additionally, signal handling is implemented using secure development practices that mitigate asynchronous execution risks, and workloads run in environments that abstract direct signal management.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4598"
},
{
"category": "external",
"summary": "RHBZ#2369242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4598"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/29/3",
"url": "https://www.openwall.com/lists/oss-security/2025/05/29/3"
}
],
"release_date": "2025-05-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-16T00:56:50+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23234"
},
{
"category": "workaround",
"details": "This issue can be mitigated by disabling the capability of the system to generate a coredump for SUID binaries. The perform that, the following command can be ran as `root` user:\n\n~~~\necho 0 \u003e /proc/sys/fs/suid_dumpable\n~~~\n\nWhile this mitigates this vulnerability while it\u0027s not possible to update the systemd package, it disables the capability of analyzing crashes for such binaries.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump"
},
{
"cve": "CVE-2025-9714",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2025-09-02T13:03:56.452000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392605"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxstl/libxml2. The \u0027exsltDynMapFunction\u0027 function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling \u0027dyn:map()\u0027, leading to stack exhaustion and a local denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No evidence was found for arbitrary memory corruption through this flaw, limiting its impact to Availability only, and reducing its severity to Moderate.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-606: Unchecked Input for Loop Condition vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation controls are in place, which ensure that any input controlling loop behavior is validated against strict criteria like type, length, and range before being processed. This prevents malicious or abnormal inputs from causing excessive or infinite iterations, thereby avoiding logic errors or system overloads. Memory protection controls such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) protect the system\u2019s memory from overuse or corruption if an unchecked input were to cause a loop to execute excessively. It ensures that memory is safely allocated and accessed, reducing the risks of buffer overflows, resource exhaustion, or crashes. Lastly, the implementation of security engineering principles dictates the use of secure coding practices, such as input validation, loop iteration limits, and error handling, are integrated during system design and development.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9714"
},
{
"category": "external",
"summary": "RHBZ#2392605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392605"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/148"
}
],
"release_date": "2025-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-16T00:56:50+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23234"
},
{
"category": "workaround",
"details": "The impact of this flaw may be reduced by setting strict resource limits to the stack size of processes at the operational system level. This can be achieved either through the \u0027ulimit\u0027 shell built-in or the \u0027limits.conf\u0027 file.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:2948da59e125936f88275352373396b5e8fe8552c2fccb4eef0122b329e8fd86_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:3248d1c8a0e5944e571be24d3aa0c188478fa7c8ce1049247e047c2bfbd0ce4a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:422ff213185d6d7828217266262f78f32d7d4910783916e8ed1a203062cbcaeb_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:e468d68b98ee628b68580ab65223a7b09c54e463cc07f030b087af64aa430f2e_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:06442a924c3efff1c077ff316661ef4133f351f72ca60ccf1eeec45deacebede_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:10bb1bf6e58604488998652bf8a9ab81ed9373030bed5e95572145716e71e4a3_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9ba6f61f42066f946b761360d08b8f8114d8bed87364c206f5ce4df63a03f592_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:7ba9953f452becf20f89c2782fb5bf408bc96219ace5764943b78e07963cabf0_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ccaca0c393ff2ec3f4177fd5627fc55fbe1cb8706fbfc96b7bddb02de80a1ade_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:cfaf2a3c9513bd280265b0e2ca5f7d60022a2e362027becfeb2c133179925523_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:1fda63e06ffffe25eae770f98f9db3a628627a81c7a830064ac8ac0256fe4d97_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2aaf7260c5a04318f176fd0bbfb278f11ea0dae523a775ba596ca87096169771_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:d9d045f74a6602f6536642511880eb3819056412c9ec7195537d04ff2192ac99_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:36cc9fde56dd1fd380b5c9f5bdd4e837980eeeb26bbcc776b05be748e23bd2bf_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:59232f6b74da7b47602f8d800bdaff4019431e0672b848f382bf0b07c639dc0c_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:c746dede748b7fed2dc144b481a2338448fed9a885d2add3dd8c56bd81dc4930_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:1e41b14d3d94ba1f2a7b2350d31ce55fad9cba15fbc4addb2249029e5d05ad2d_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:22549436a7705ad158bad40441d6d8fb29466fffd9efb2832febdeb4e5c21412_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f4efe2a624caaf3f01c5c1638158ade6dfc3bff384796a7b73a41fa6ce9e8976_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…