rhsa-2025:13671
Vulnerability from csaf_redhat
Published
2025-08-12 04:43
Modified
2025-08-12 09:12
Summary
Red Hat Security Advisory: Updated 7.1 container image is now available in the Red Hat Ecosystem Catalog
Notes
Topic
Updated rhceph-7.1 container image is now available in the Red Hat Ecosystem Catalog.
Details
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
This new container image is based on Red Hat Ceph Storage 7.1 and Red Hat Enterprise Linux 8.10, 9.4, 9.5.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
All users of Red Hat Ceph Storage are advised to pull new images from the Red Hat Ecosystem catalog, which provides security fixes.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated rhceph-7.1 container image is now available in the Red Hat Ecosystem Catalog.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. \n \nThis new container image is based on Red Hat Ceph Storage 7.1 and Red Hat Enterprise Linux 8.10, 9.4, 9.5.\n\nSecurity Fix(es):\n\n* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)\n\nAll users of Red Hat Ceph Storage are advised to pull new images from the Red Hat Ecosystem catalog, which provides security fixes.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:13671", "url": "https://access.redhat.com/errata/RHSA-2025:13671" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/7/html/7.1_release_notes", "url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/7/html/7.1_release_notes" }, { "category": "external", "summary": "2358493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13671.json" } ], "title": "Red Hat Security Advisory: Updated 7.1 container image is now available in the Red Hat Ecosystem Catalog", "tracking": { "current_release_date": "2025-08-12T09:12:18+00:00", "generator": { "date": "2025-08-12T09:12:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:13671", "initial_release_date": "2025-08-12T04:43:04+00:00", "revision_history": [ { "date": "2025-08-12T04:43:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-08-12T04:43:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-12T09:12:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ceph Storage 7.1 Tools", "product": { "name": "Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:7.1::el9" } } } ], "category": "product_family", "name": "Red Hat Ceph Storage" }, { "branches": [ { "category": "product_version", "name": "rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "product": { "name": "rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "product_id": "rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/grafana-rhel9\u0026tag=11.6.2-9" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "product": { "name": "rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "product_id": "rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-76" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v3.0.0-43" } } }, { "category": "product_version", "name": "rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "product": { "name": "rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "product_id": "rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-7-rhel9\u0026tag=latest" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-78" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64", "product_id": "rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-126" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "product": { "name": "rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "product_id": "rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/grafana-rhel9\u0026tag=11.6.2-9" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "product": { "name": "rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "product_id": "rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-76" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v3.0.0-43" } } }, { "category": "product_version", "name": "rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "product": { "name": "rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "product_id": "rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-7-rhel9\u0026tag=latest" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-78" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "product_id": "rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-126" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "product": { "name": "rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "product_id": "rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/grafana-rhel9\u0026tag=11.6.2-9" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "product": { "name": "rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "product_id": "rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-76" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v3.0.0-43" } } }, { "category": "product_version", "name": "rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "product": { "name": "rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "product_id": "rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-7-rhel9\u0026tag=latest" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-78" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "product_id": "rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-126" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le" }, "product_reference": "rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x" }, "product_reference": "rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64" }, "product_reference": "rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64" }, "product_reference": "rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le" }, "product_reference": "rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x" }, "product_reference": "rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x" }, "product_reference": "rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64" }, "product_reference": "rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le" }, "product_reference": "rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-22871", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2025-04-08T21:01:32.229479+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2358493" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smuggling\u2014where an attacker tricks the system to send hidden or unauthorized requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "net/http: Request smuggling due to acceptance of invalid chunked data in net/http", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite includes affected component however product is not directly impacted since the vulnerability arises when \"net/http\" is used as a server. Satellite uses it solely as a client, so it\u0027s not exposed to the flaw. Product Security has assessed this as Low severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22871" }, { "category": "external", "summary": "RHBZ#2358493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22871" }, { "category": "external", "summary": "https://go.dev/cl/652998", "url": "https://go.dev/cl/652998" }, { "category": "external", "summary": "https://go.dev/issue/71988", "url": "https://go.dev/issue/71988" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk", "url": "https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3563", "url": "https://pkg.go.dev/vuln/GO-2025-3563" } ], "release_date": "2025-04-08T20:04:34.769000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-08-12T04:43:04+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2789521\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993", "product_ids": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:13671" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:7c893a65867115da701a9222dea3d31e4f3809b857781c076a9764facbc9a113_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:a3f03f8f96603d8e493294f1bfcdc45fbbdfb3c860b0928e1b606246ed98bc93_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:f986faff3d696b907ec531e216b162e7259c1f9c9a2e34186a3ea562ccc28a94_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:a5bfbfa51b658f05e549dc2d128a5e9ba90e3cac10ef4f7b1507e73f1ce3a9cd_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:ab291dfd59526f18a092dcfccdf1843c06b615696087230c943d8a520cfc2619_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:e007308a4a8395f737faba5305622cde74a3bd16bb9ef6a09b264515ee69c305_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:01009b9ff1add5a401ea0d6105c0024b1a4d593bcd78d6109c46433216414cb1_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:0728ea0f73187d09257cd757de426dcb0f653d045fc17ef84590c32c524b312c_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:5cdec6a42b16104b2b12c2fa61cedb10610a9021cad17b9cb8ef02eab0f33704_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:60d9c1f40ff65ac978b5efbc183665bc153fa915b8170ba430a3c42a7a2d60b1_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:abd13a21e4225e6b85254e14c23e76bcbc21a769de12415d712d960fc2a8d37b_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:cff029244cda2e30f5940f05ca2335bdbf01e64f11b0d1b8f8dcf032ded3225f_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:463185023a91bef87f63c81d172614b408de4c6f310cb468b8993fe83b591029_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b793bbf412e03da3c49a0fcf3b7c501507fdae02fefd330336e2642b75fca1b9_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:d9bce6d4815dccd1c34920966f026db99ee62768050e7c8099ec10eacb806632_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:6fba423acaabbb10c382cd7231f8514bc4bcd191595016d117b0baa76b9af2e0_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b00b130883fd4910243c23a7bfe5fb3f46a29af535b97a1e31dafeda2e7bca88_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:b74eb62ccffed853f34d6968bfdd3413dd7287725a324f81f1196a1cb16c34f4_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net/http: Request smuggling due to acceptance of invalid chunked data in net/http" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…