{
  "threat_severity" : "Low",
  "public_date" : "2022-02-21T00:00:00Z",
  "bugzilla" : {
    "description" : "libsolv: heap-overflows in resolve_dependencies function",
    "id" : "2057178",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2057178"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-125",
  "details" : [ "Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 & line 1995), which could cause a remote Denial of Service.", "A buffer over-read flaw was found in the test case reader in libsolv that created multiple out-of-bounds read symptoms. Depending on how client applications use libsolv, this flaw leads to a denial of service of the application if an attacker can supply crafted input to the test case reader." ],
  "statement" : "This flaw has been marked as Low impact because it is in the test case reader and is an out-of-bounds read.\nThis issue is related to already fixed issue (https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec) that is part of libsolv-0.7.17. \nRHEL-8.6.z and above, and RHEL-9 ships versions of libsolv greater than 0.7.17. Hence, as the flaw is having LOW security impact, Red Hat Enterprise Linux - 8, 9 are set to not affected. However, RHEL-8 streams that ships libsolv versions prior to 0.7.17 are still affected. \nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle & Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.11 for RHEL 7",
    "release_date" : "2022-07-05T00:00:00Z",
    "advisory" : "RHSA-2022:5498",
    "cpe" : "cpe:/a:redhat:satellite:6.11::el7",
    "package" : "libsolv-0:0.7.22-1.el7pc"
  }, {
    "product_name" : "Red Hat Satellite 6.11 for RHEL 7",
    "release_date" : "2022-07-05T00:00:00Z",
    "advisory" : "RHSA-2022:5498",
    "cpe" : "cpe:/a:redhat:satellite_capsule:6.11::el7",
    "package" : "libsolv-0:0.7.22-1.el7pc"
  }, {
    "product_name" : "Red Hat Satellite 6.11 for RHEL 8",
    "release_date" : "2022-07-05T00:00:00Z",
    "advisory" : "RHSA-2022:5498",
    "cpe" : "cpe:/a:redhat:satellite:6.11::el8",
    "package" : "libsolv-0:0.7.22-1.el8pc"
  }, {
    "product_name" : "Red Hat Satellite 6.11 for RHEL 8",
    "release_date" : "2022-07-05T00:00:00Z",
    "advisory" : "RHSA-2022:5498",
    "cpe" : "cpe:/a:redhat:satellite_capsule:6.11::el8",
    "package" : "libsolv-0:0.7.22-1.el8pc"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "libsolv",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "libsolv",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "libsolv",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Update Infrastructure 3 for Cloud Providers",
    "fix_state" : "Will not fix",
    "package_name" : "libsolv",
    "cpe" : "cpe:/a:redhat:rhui:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-44568\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-44568" ],
  "name" : "CVE-2021-44568",
  "csaw" : false
}