Action not permitted
Modal body text goes here.
CVE-2019-1002101
Vulnerability from cvelistv5
Published
2019-04-01 14:14
Modified
2024-09-16 20:46
Severity ?
EPSS score ?
Summary
kubectl cp path traversal
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Kubernetes | Kubernetes |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:00:19.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kubernetes/kubernetes/pull/75037" }, { "name": "107652", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107652" }, { "name": "RHBA-2019:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHBA-2019:0620" }, { "name": "RHBA-2019:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHBA-2019:0619" }, { "name": "RHBA-2019:0636", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHBA-2019:0636" }, { "name": "FEDORA-2019-bf800b1c04", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/" }, { "name": "[oss-security] 20190620 [ANNOUNCE] Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/21/1" }, { "name": "[oss-security] 20190805 Kubernetes v1.13.9, v1.14.5, v1.15.2 released to address CVE-2019-11247, CVE-2019-11249", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/05/5" }, { "name": "FEDORA-2019-2b8ef08c95", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kubernetes", "vendor": "Kubernetes", "versions": [ { "status": "affected", "version": "1.1-1.10" }, { "lessThan": "1.11.9", "status": "affected", "version": "1.11", "versionType": "custom" }, { "lessThan": "1.12.7", "status": "affected", "version": "1.12", "versionType": "custom" }, { "lessThan": "1.13.5", "status": "affected", "version": "1.13", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ariel Zelivansky of Twistlock" } ], "dateAssigned": "2019-03-05T00:00:00", "datePublic": "2019-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Data Handling", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-22T15:51:27", "orgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "shortName": "dwf" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kubernetes/kubernetes/pull/75037" }, { "name": "107652", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107652" }, { "name": "RHBA-2019:0620", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHBA-2019:0620" }, { "name": "RHBA-2019:0619", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHBA-2019:0619" }, { "name": "RHBA-2019:0636", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHBA-2019:0636" }, { "name": "FEDORA-2019-bf800b1c04", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/" }, { "name": "[oss-security] 20190620 [ANNOUNCE] Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/21/1" }, { "name": "[oss-security] 20190805 Kubernetes v1.13.9, v1.14.5, v1.15.2 released to address CVE-2019-11247, CVE-2019-11249", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/05/5" }, { "name": "FEDORA-2019-2b8ef08c95", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/" } ], "source": { "advisory": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/OYFV1hiDE2w", "defect": [ "75037" ], "discovery": "EXTERNAL" }, "title": "kubectl cp path traversal", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "DATE_ASSIGNED": "2019-03-05", "DATE_PUBLIC": "2019-03-28", "ID": "CVE-2019-1002101", "STATE": "PUBLIC", "TITLE": "kubectl cp path traversal" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kubernetes", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.11", "version_value": "1.11.9" }, { "version_affected": "\u003c", "version_name": "1.12", "version_value": "1.12.7" }, { "version_affected": "\u003c", "version_name": "1.13", "version_value": "1.13.5" }, { "version_affected": "=", "version_name": "1.1-1.10", "version_value": "1.1-1.10" } ] } } ] }, "vendor_name": "Kubernetes" } ] } }, "credit": [ { "lang": "eng", "value": "Ariel Zelivansky of Twistlock" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Handling" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kubernetes/kubernetes/pull/75037", "refsource": "MISC", "url": "https://github.com/kubernetes/kubernetes/pull/75037" }, { "name": "107652", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107652" }, { "name": "RHBA-2019:0620", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0620" }, { "name": "RHBA-2019:0619", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0619" }, { "name": "RHBA-2019:0636", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0636" }, { "name": "FEDORA-2019-bf800b1c04", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/" }, { "name": "[oss-security] 20190620 [ANNOUNCE] Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/21/1" }, { "name": "[oss-security] 20190805 Kubernetes v1.13.9, v1.14.5, v1.15.2 released to address CVE-2019-11247, CVE-2019-11249", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/05/5" }, { "name": "FEDORA-2019-2b8ef08c95", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/" }, { "name": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/", "refsource": "MISC", "url": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/" } ] }, "source": { "advisory": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/OYFV1hiDE2w", "defect": [ "75037" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "assignerShortName": "dwf", "cveId": "CVE-2019-1002101", "datePublished": "2019-04-01T14:14:27.768040Z", "dateReserved": "2019-04-01T00:00:00", "dateUpdated": "2024-09-16T20:46:49.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-1002101\",\"sourceIdentifier\":\"josh@bress.net\",\"published\":\"2019-04-01T14:29:00.640\",\"lastModified\":\"2023-11-07T03:02:13.563\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.\"},{\"lang\":\"es\",\"value\":\"El comando kubectl cp permite copiar archivos entre contenedores y la m\u00e1quina del usuario. Para copiar archivos de un contenedor, Kubernetes crea un alquitr\u00e1n dentro del contenedor, lo copia a trav\u00e9s de la red y kubectl lo descomprime en la m\u00e1quina del usuario. Si el binario tar en el contenedor es malicioso, podr\u00eda ejecutar cualquier c\u00f3digo y generar resultados inesperados y maliciosos. Un atacante podr\u00eda usar esto para escribir archivos en cualquier ruta en la m\u00e1quina del usuario cuando se llama a kubectl cp, limitado solo por los permisos del sistema del usuario local. La funci\u00f3n untar puede crear y seguir enlaces simb\u00f3licos. El problema se resuelve en kubectl v1.11.9, v1.12.7, v1.13.5 y v1.14.0.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"josh@bress.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.11.0\",\"versionEndExcluding\":\"1.11.9\",\"matchCriteriaId\":\"0BDD5F47-BEF5-409E-AB7D-CC0F80EECDBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.12.0\",\"versionEndExcluding\":\"1.12.7\",\"matchCriteriaId\":\"DDF6BA38-1A7C-46AB-A404-06ABB3ADFFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.13.0\",\"versionEndExcluding\":\"1.13.5\",\"matchCriteriaId\":\"147CD8D3-60A8-4314-AD92-670CB330F85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:1.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BE234F2-20DA-4D5B-AD9D-AC7F39DB9D1D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309CB6F8-F178-454C-BE97-787F78647C28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DBCD38F-BBE8-488C-A8C3-5782F191D915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F87326E-0B56-4356-A889-73D026DB1D4B\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/21/1\",\"source\":\"josh@bress.net\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/05/5\",\"source\":\"josh@bress.net\"},{\"url\":\"http://www.securityfocus.com/bid/107652\",\"source\":\"josh@bress.net\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHBA-2019:0619\",\"source\":\"josh@bress.net\"},{\"url\":\"https://access.redhat.com/errata/RHBA-2019:0620\",\"source\":\"josh@bress.net\"},{\"url\":\"https://access.redhat.com/errata/RHBA-2019:0636\",\"source\":\"josh@bress.net\"},{\"url\":\"https://access.redhat.com/security/cve/cve-2019-1002101\",\"source\":\"nvd@nist.gov\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/pull/75037\",\"source\":\"josh@bress.net\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/\",\"source\":\"josh@bress.net\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/\",\"source\":\"josh@bress.net\"},{\"url\":\"https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/\",\"source\":\"josh@bress.net\"}]}}" } }
rhba-2019_0620
Vulnerability from csaf_redhat
Published
2019-04-09 23:41
Modified
2024-11-05 15:52
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.10 bug fix update
Notes
Topic
Red Hat OpenShift Container Platform release 3.10.127 is now available with
updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.10.127. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2019:0621
This update fixes the following bugs:
* Playbooks that redeployed master certificates did not update `webconsole` secrets, causing failure to start the `webconsole` after redeployment. Now, `webconsole` secrets are re-created when master certificate playbooks are used and the `webconsole`now works properly. (BZ#1667981)
* The files that implemented log rotation functionality were not copied to the correct `fluentd` directory. As a result, logs were not rotated. Now, the container build inspects the `fluentd` gem to find out where to install the files. The files that implement log rotation are copied to the correct directory for `fluentd` usage. (BZ#1684210)
* The SSL and TLS service uses Diffie-Hellman groups with insufficient strength (a key size less than 2048 bytes). As a result, the keys are more vulnerable. Now, the key strength has been increased and certificates are more secure. (BZ#1686135)
* When a cluster was installed, the user name in the loopback kubeconfig is the same as the host name of the master. Now, the variable in the playbook is changed to a different value. (BZ#1686585)
* Using `MERGE_JSON_LOG=true` would create fields in the record that would cause syntax violations or create too many fields in `Elasticsearch`, causing severe performance problems. Now, users who experience these problems can tune `fluentd` to accommodate their log record fields without errors or `Elasticsearch` performance degradation. (BZ#1686946)
* If an override host name had been set, the sync script generated an error in the sync logs. This has now been resolved and is no longer present in situations where `/etc/sysconfig/KUBELET_HOSTNAME_OVERRIDE` is not present. (BZ#1687803)
* Upgrade playbooks ran several `oc` commands that used resource aliases that may not be immediately available after a restart or other reasons. Now, the `oc` suite of commands uses the fully qualified resource name to avoid potential failure. (BZ#1688452)
All OpenShift Container Platform 3.10 users are advised to upgrade to these
updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.10.127 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.10.127. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2019:0621\n\nThis update fixes the following bugs:\n\n* Playbooks that redeployed master certificates did not update `webconsole` secrets, causing failure to start the `webconsole` after redeployment. Now, `webconsole` secrets are re-created when master certificate playbooks are used and the `webconsole`now works properly. (BZ#1667981)\n\n* The files that implemented log rotation functionality were not copied to the correct `fluentd` directory. As a result, logs were not rotated. Now, the container build inspects the `fluentd` gem to find out where to install the files. The files that implement log rotation are copied to the correct directory for `fluentd` usage. (BZ#1684210)\n\n* The SSL and TLS service uses Diffie-Hellman groups with insufficient strength (a key size less than 2048 bytes). As a result, the keys are more vulnerable. Now, the key strength has been increased and certificates are more secure. (BZ#1686135)\n\n* When a cluster was installed, the user name in the loopback kubeconfig is the same as the host name of the master. Now, the variable in the playbook is changed to a different value. (BZ#1686585)\n\n* Using `MERGE_JSON_LOG=true` would create fields in the record that would cause syntax violations or create too many fields in `Elasticsearch`, causing severe performance problems. Now, users who experience these problems can tune `fluentd` to accommodate their log record fields without errors or `Elasticsearch` performance degradation. (BZ#1686946)\n\n* If an override host name had been set, the sync script generated an error in the sync logs. This has now been resolved and is no longer present in situations where `/etc/sysconfig/KUBELET_HOSTNAME_OVERRIDE` is not present. (BZ#1687803)\n\n* Upgrade playbooks ran several `oc` commands that used resource aliases that may not be immediately available after a restart or other reasons. Now, the `oc` suite of commands uses the fully qualified resource name to avoid potential failure. (BZ#1688452)\n\nAll OpenShift Container Platform 3.10 users are advised to upgrade to these\nupdated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:0620", "url": "https://access.redhat.com/errata/RHBA-2019:0620" }, { "category": "external", "summary": "1538488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538488" }, { "category": "external", "summary": "1554624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554624" }, { "category": "external", "summary": "1572493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572493" }, { "category": "external", "summary": "1579515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579515" }, { "category": "external", "summary": "1591118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591118" }, { "category": "external", "summary": "1624197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624197" }, { "category": "external", "summary": "1667981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667981" }, { "category": "external", "summary": "1684210", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684210" }, { "category": "external", "summary": "1686135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686135" }, { "category": "external", "summary": "1686140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686140" }, { "category": "external", "summary": "1686585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686585" }, { "category": "external", "summary": "1686946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686946" }, { "category": "external", "summary": "1687803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687803" }, { "category": "external", "summary": "1688452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688452" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_0620.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 3.10 bug fix update", "tracking": { "current_release_date": "2024-11-05T15:52:48+00:00", "generator": { "date": "2024-11-05T15:52:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHBA-2019:0620", "initial_release_date": "2019-04-09T23:41:18+00:00", "revision_history": [ { "date": "2019-04-09T23:41:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-04-09T23:41:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T15:52:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.10.127-1.git.0.44580c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.10.127-1.git.50.eab7949.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.10.127-1.git.55.b54f8c7.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.10.127-1.git.55.b54f8c7.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.10.127-1.git.0.f8aa6dd.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.10.127-1.git.153.bc1eddd.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_id": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.10.127-1.git.0.dab74c6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.10.127-1.git.0.4f5519b.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.10.127-1.git.0.8ebe819.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.10.127-1.git.0.44580c6.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src", "product_id": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.10.127-1.git.50.eab7949.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.10.127-1.git.55.b54f8c7.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src", "product": { "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src", "product_id": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.10.127-1.git.0.f8aa6dd.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src", "product_id": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.10.127-1.git.153.bc1eddd.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src", "product": { "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src", "product_id": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.10.127-1.git.0.dab74c6.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.10.127-1.git.0.4f5519b.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.10.127-1.git.0.8ebe819.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src", "product": { "name": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src", "product_id": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.10.127-1.git.0.131da09.el7?arch=src" } } }, { "category": "product_version", "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "product": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "product_id": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model@0.0.18-1.el7?arch=src" } } }, { "category": "product_version", "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "product": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "product_id": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libcloud@2.2.1-20180102gitd701bf9.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.10.127-1.git.0.44580c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.10.127-1.git.50.eab7949.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.10.127-1.git.55.b54f8c7.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.10.127-1.git.55.b54f8c7.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le", "product": { "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le", "product_id": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.10.127-1.git.0.f8aa6dd.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.10.127-1.git.153.bc1eddd.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.10.127-1.git.0.dab74c6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.10.127-1.git.0.4f5519b.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.10.127-1.git.0.8ebe819.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.10.127-1.git.0.dab74c6.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.10.127-1.git.0.dab74c6.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch", "product_id": "openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-roles@3.10.127-1.git.0.131da09.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch", "product": { "name": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch", "product_id": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.10.127-1.git.0.131da09.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch", "product_id": "openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-docs@3.10.127-1.git.0.131da09.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-playbooks@3.10.127-1.git.0.131da09.el7?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "product": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "product_id": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model@0.0.18-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "product": { "name": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "product_id": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model-doc@0.0.18-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "product": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "product_id": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libcloud@2.2.1-20180102gitd701bf9.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src" }, "product_reference": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le" }, "product_reference": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src" }, "product_reference": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch" }, "product_reference": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src" }, "product_reference": "openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch" }, "product_reference": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src" }, "product_reference": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch" }, "product_reference": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src" }, "product_reference": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" }, "product_reference": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ariel Zelivansky" ], "organization": "Twistlock" } ], "cve": "CVE-2019-1002101", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2019-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685213" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kubernetes via the mishandling of symlinks when copying files from a running container. An attacker could exploit this by convincing a user to use `kubectl cp` or `oc cp` with a malicious container, allowing for arbitrary files to be overwritten on the host machine.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp`", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects Kubernetes starting from version 1.9. OpenShift Container Platform (OCP) versions 3.9 and later are also affected.\n\nThis issue did not affect the version of Kubernetes(embedded in heketi) shipped with Red Hat Gluster Storage 3 as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64", "7Server-RH7-RHOSE-3.10:golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src", "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src", "7Server-RH7-RHOSE-3.10:openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le", "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64", "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1002101" }, { "category": "external", "summary": "RHBZ#1685213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685213" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1002101", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1002101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101" }, { "category": "external", "summary": "https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712", "url": "https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712" } ], "release_date": "2019-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-04-09T23:41:18+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system are applied.\n\nSee the following documentation, which will be updated shortly for release 3.10.127, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64", "7Server-RH7-RHOSE-3.10:golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src", "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src", "7Server-RH7-RHOSE-3.10:openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le", "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64", "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:0620" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.src", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-enterprise-service-catalog-svcat-1:3.10.127-1.git.55.b54f8c7.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-descheduler-0:3.10.127-1.git.153.bc1eddd.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-dockerregistry-0:3.10.127-1.git.0.f8aa6dd.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.127-1.git.0.dab74c6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-problem-detector-0:3.10.127-1.git.0.4f5519b.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.127-1.git.0.dab74c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-web-console-0:3.10.127-1.git.50.eab7949.el7.x86_64", "7Server-RH7-RHOSE-3.10:golang-github-prometheus-node_exporter-0:3.10.127-1.git.0.8ebe819.el7.src", "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-0:3.10.127-1.git.0.131da09.el7.src", "7Server-RH7-RHOSE-3.10:openshift-ansible-docs-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-playbooks-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-ansible-roles-0:3.10.127-1.git.0.131da09.el7.noarch", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.src", "7Server-RH7-RHOSE-3.10:openshift-enterprise-cluster-capacity-0:3.10.127-1.git.0.44580c6.el7.x86_64", "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.ppc64le", "7Server-RH7-RHOSE-3.10:prometheus-node-exporter-0:3.10.127-1.git.0.8ebe819.el7.x86_64", "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "7Server-RH7-RHOSE-3.10:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "7Server-RH7-RHOSE-3.10:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp`" } ] }
rhba-2019_0636
Vulnerability from csaf_redhat
Published
2019-04-11 05:39
Modified
2024-11-05 15:52
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
Notes
Topic
Red Hat OpenShift Container Platform release 3.11.98 is now available with
updates to packages and images that fix several bugs and add enhancements.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.98. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2019:0637
Space precludes documenting all of the bug fixes and enhancements in this
advisory. See the following Release Notes documentation, which will be
updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
All OpenShift Container Platform 3.11 users are advised to upgrade to these
updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.11.98 is now available with\nupdates to packages and images that fix several bugs and add enhancements.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.11.98. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2019:0637\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory. See the following Release Notes documentation, which will be\nupdated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:0636", "url": "https://access.redhat.com/errata/RHBA-2019:0636" }, { "category": "external", "summary": "1268877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1268877" }, { "category": "external", "summary": "1414227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414227" }, { "category": "external", "summary": "1486210", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486210" }, { "category": "external", "summary": "1529482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529482" }, { "category": "external", "summary": "1548640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548640" }, { "category": "external", "summary": "1569432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569432" }, { "category": "external", "summary": "1586015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1586015" }, { "category": "external", "summary": "1598139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1598139" }, { "category": "external", "summary": "1623261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623261" }, { "category": "external", "summary": "1623612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623612" }, { "category": "external", "summary": "1639739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639739" }, { "category": "external", "summary": "1641221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1641221" }, { "category": "external", "summary": "1642589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642589" }, { "category": "external", "summary": "1644084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644084" }, { "category": "external", "summary": "1647348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647348" }, { "category": "external", "summary": "1655641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655641" }, { "category": "external", "summary": "1657003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1657003" }, { "category": "external", "summary": "1657769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1657769" }, { "category": "external", "summary": "1658387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658387" }, { "category": "external", "summary": "1659442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659442" }, { "category": "external", "summary": "1662312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1662312" }, { "category": "external", "summary": "1666491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666491" }, { "category": "external", "summary": "1667302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667302" }, { "category": "external", "summary": "1668317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668317" }, { "category": "external", "summary": "1669560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669560" }, { "category": "external", "summary": "1670473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670473" }, { "category": "external", "summary": "1672011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672011" }, { "category": "external", "summary": "1672904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672904" }, { "category": "external", "summary": "1674170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1674170" }, { "category": "external", "summary": "1675133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1675133" }, { "category": "external", "summary": "1677509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677509" }, { "category": "external", "summary": "1677545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677545" }, { "category": "external", "summary": "1679159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679159" }, { "category": "external", "summary": "1679453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679453" }, { "category": "external", "summary": "1679613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679613" }, { "category": "external", "summary": "1683519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683519" }, { "category": "external", "summary": "1685072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685072" }, { "category": "external", "summary": "1685243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685243" }, { "category": "external", "summary": "1685606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685606" }, { "category": "external", "summary": "1685618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685618" }, { "category": "external", "summary": "1685655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685655" }, { "category": "external", "summary": "1685970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685970" }, { "category": "external", "summary": "1686449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686449" }, { "category": "external", "summary": "1686590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686590" }, { "category": "external", "summary": "1686941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686941" }, { "category": "external", "summary": "1689366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689366" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_0636.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-05T15:52:39+00:00", "generator": { "date": "2024-11-05T15:52:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHBA-2019:0636", "initial_release_date": "2019-04-11T05:39:07+00:00", "revision_history": [ { "date": "2019-04-11T05:39:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-04-11T05:39:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T15:52:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.98-1.git.0.a7877b0.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.98-1.git.0.a7877b0.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.98-1.git.153.6c2426d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.98-1.git.50.bd70c76.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64", "product": { "name": "prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64", "product_id": "prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.98-1.git.0.61907ad.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.98-1.git.0.6737a19.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.98-1.git.0.deb9250.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.98-1.git.0.83348c7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.98-1.git.92.7ebe477.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.11.98-1.git.0.0cbaff3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.98-1.git.0.fd9716c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.98-1.git.52.0623d01.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.98-1.git.0.27979f1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.98-1.git.0.b02f11c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.98-1.git.14.1793066.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.98-1.git.0.3b82207.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.98-1.git.0.a7877b0.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.98-1.git.153.6c2426d.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.98-1.git.50.bd70c76.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-prometheus@3.11.98-1.git.0.61907ad.el7?arch=src" } } }, { "category": "product_version", "name": "python-certifi-0:2018.4.16-2.el7.src", "product": { "name": "python-certifi-0:2018.4.16-2.el7.src", "product_id": "python-certifi-0:2018.4.16-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-certifi@2018.4.16-2.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.98-1.git.0.6737a19.el7?arch=src" } } }, { "category": "product_version", "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "product": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "product_id": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model@0.0.18-1.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.98-1.git.0.deb9250.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.98-1.git.0.83348c7.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.98-1.git.92.7ebe477.el7?arch=src" } } }, { "category": "product_version", "name": "python-docker-0:2.4.2-2.el7.src", "product": { "name": "python-docker-0:2.4.2-2.el7.src", "product_id": "python-docker-0:2.4.2-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docker@2.4.2-2.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src", "product": { "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src", "product_id": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.98-1.git.0.0cbaff3.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.98-1.git.0.fd9716c.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.98-1.git.52.0623d01.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src", "product_id": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.98-1.git.0.27979f1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.98-1.git.0.b02f11c.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.98-1.git.14.1793066.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src", "product": { "name": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src", "product_id": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.11.98-1.git.0.3cfa7c3.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.98-1.git.0.3b82207.el7?arch=src" } } }, { "category": "product_version", "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "product": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "product_id": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libcloud@2.2.1-20180102gitd701bf9.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.98-1.git.0.a7877b0.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.98-1.git.0.a7877b0.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.98-1.git.153.6c2426d.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.98-1.git.50.bd70c76.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le", "product": { "name": "prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le", "product_id": "prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.98-1.git.0.61907ad.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.98-1.git.0.6737a19.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.98-1.git.0.deb9250.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.98-1.git.0.83348c7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.98-1.git.92.7ebe477.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.11.98-1.git.0.0cbaff3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.98-1.git.0.fd9716c.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.98-1.git.52.0623d01.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le", "product_id": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.98-1.git.0.27979f1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.98-1.git.0.b02f11c.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.98-1.git.14.1793066.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.98-1.git.0.3b82207.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python2-certifi-0:2018.4.16-2.el7.noarch", "product": { "name": "python2-certifi-0:2018.4.16-2.el7.noarch", "product_id": "python2-certifi-0:2018.4.16-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-certifi@2018.4.16-2.el7?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "product": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "product_id": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model@0.0.18-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "product": { "name": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "product_id": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model-doc@0.0.18-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-docker-0:2.4.2-2.el7.noarch", "product": { "name": "python-docker-0:2.4.2-2.el7.noarch", "product_id": "python-docker-0:2.4.2-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docker@2.4.2-2.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.11.98-1.git.0.0cbaff3.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.11.98-1.git.0.0cbaff3.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_id": "openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-docs@3.11.98-1.git.0.3cfa7c3.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-playbooks@3.11.98-1.git.0.3cfa7c3.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product": { "name": "openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_id": "openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@3.11.98-1.git.0.3cfa7c3.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product": { "name": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_id": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.11.98-1.git.0.3cfa7c3.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_id": "openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-roles@3.11.98-1.git.0.3cfa7c3.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "product": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "product_id": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libcloud@2.2.1-20180102gitd701bf9.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src" }, "product_reference": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch" }, "product_reference": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src" }, "product_reference": "openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch" }, "product_reference": "openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64" }, "product_reference": "prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-certifi-0:2018.4.16-2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python-certifi-0:2018.4.16-2.el7.src" }, "product_reference": "python-certifi-0:2018.4.16-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-docker-0:2.4.2-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.noarch" }, "product_reference": "python-docker-0:2.4.2-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-docker-0:2.4.2-2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.src" }, "product_reference": "python-docker-0:2.4.2-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch" }, "product_reference": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src" }, "product_reference": "python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-certifi-0:2018.4.16-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python2-certifi-0:2018.4.16-2.el7.noarch" }, "product_reference": "python2-certifi-0:2018.4.16-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch" }, "product_reference": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src" }, "product_reference": "rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" }, "product_reference": "rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ariel Zelivansky" ], "organization": "Twistlock" } ], "cve": "CVE-2019-1002101", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2019-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685213" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kubernetes via the mishandling of symlinks when copying files from a running container. An attacker could exploit this by convincing a user to use `kubectl cp` or `oc cp` with a malicious container, allowing for arbitrary files to be overwritten on the host machine.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp`", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects Kubernetes starting from version 1.9. OpenShift Container Platform (OCP) versions 3.9 and later are also affected.\n\nThis issue did not affect the version of Kubernetes(embedded in heketi) shipped with Red Hat Gluster Storage 3 as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-certifi-0:2018.4.16-2.el7.src", "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.noarch", "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.src", "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "7Server-RH7-RHOSE-3.11:python2-certifi-0:2018.4.16-2.el7.noarch", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1002101" }, { "category": "external", "summary": "RHBZ#1685213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685213" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1002101", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1002101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101" }, { "category": "external", "summary": "https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712", "url": "https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712" } ], "release_date": "2019-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-04-11T05:39:07+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system are applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.98, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-certifi-0:2018.4.16-2.el7.src", "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.noarch", "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.src", "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "7Server-RH7-RHOSE-3.11:python2-certifi-0:2018.4.16-2.el7.noarch", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:0636" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.98-1.git.0.a7877b0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.98-1.git.0.3b82207.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.98-1.git.153.6c2426d.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.98-1.git.0.27979f1.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.98-1.git.0.0cbaff3.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.98-1.git.52.0623d01.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.98-1.git.0.83348c7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.98-1.git.14.1793066.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.98-1.git.0.0cbaff3.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.98-1.git.50.bd70c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.98-1.git.0.fd9716c.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.98-1.git.0.b02f11c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.98-1.git.0.61907ad.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.98-1.git.0.3cfa7c3.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.98-1.git.0.3cfa7c3.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.98-1.git.0.6737a19.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.98-1.git.0.deb9250.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.98-1.git.0.61907ad.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.98-1.git.92.7ebe477.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.98-1.git.0.b02f11c.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-certifi-0:2018.4.16-2.el7.src", "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.noarch", "7Server-RH7-RHOSE-3.11:python-docker-0:2.4.2-2.el7.src", "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.noarch", "7Server-RH7-RHOSE-3.11:python-libcloud-0:2.2.1-20180102gitd701bf9.el7.src", "7Server-RH7-RHOSE-3.11:python2-certifi-0:2018.4.16-2.el7.noarch", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.noarch", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-0:0.0.18-1.el7.src", "7Server-RH7-RHOSE-3.11:rubygem-fluent-plugin-viaq_data_model-doc-0:0.0.18-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp`" } ] }
rhba-2019_0619
Vulnerability from csaf_redhat
Published
2019-04-09 14:20
Modified
2024-11-05 15:52
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.9 bug fix update
Notes
Topic
Red Hat OpenShift Container Platform release 3.9.74 is now available with
updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.9.74. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2019:0618
This update fixes the following bugs:
* Passing the `--incremental` argument when running a non-docker strategy build was not checked for validity. As a result, a null pointer error can occur attempting to process the invalid argument. Now, the arguments are checked to ensure they are applicable. An error is now returned to the user instead of a null pointer condition. (BZ#1541911)
* The SSL and TLS service uses Diffie-Hellman groups with insufficient strength (a key size less than 2048 bytes). As a result, the keys are more vulnerable. Now, the key strength has been increased and certificates are more secure. (BZ#1679841)
* The files that implemented log rotation functionality were not copied to the correct `fluentd` directory. As a result, logs were not rotated. Now, the container build inspects the `fluentd` gem to find out where to install the files. The files that implement log rotation are copied to the correct directory for `fluentd` usage. (BZ#1684048)
* When a cluster was installed, the user name in the loopback kubeconfig is the same as the host name of the master. Now, the variable in the playbook is changed to a different value. (BZ#1686587)
* Using `MERGE_JSON_LOG=true` would create fields in the record that would cause syntax violations or create too many fields in `Elasticsearch`, causing severe performance problems. Now, users who experience these problems can tune `fluentd` to accommodate their log record fields without errors or `Elasticsearch` performance degradation. (BZ#1686947)
All OpenShift Container Platform 3.9 users are advised to upgrade to these
updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.9.74 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.9.74. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2019:0618\n\nThis update fixes the following bugs:\n\n* Passing the `--incremental` argument when running a non-docker strategy build was not checked for validity. As a result, a null pointer error can occur attempting to process the invalid argument. Now, the arguments are checked to ensure they are applicable. An error is now returned to the user instead of a null pointer condition. (BZ#1541911)\n\n* The SSL and TLS service uses Diffie-Hellman groups with insufficient strength (a key size less than 2048 bytes). As a result, the keys are more vulnerable. Now, the key strength has been increased and certificates are more secure. (BZ#1679841)\n\n* The files that implemented log rotation functionality were not copied to the correct `fluentd` directory. As a result, logs were not rotated. Now, the container build inspects the `fluentd` gem to find out where to install the files. The files that implement log rotation are copied to the correct directory for `fluentd` usage. (BZ#1684048)\n\n* When a cluster was installed, the user name in the loopback kubeconfig is the same as the host name of the master. Now, the variable in the playbook is changed to a different value. (BZ#1686587)\n\n* Using `MERGE_JSON_LOG=true` would create fields in the record that would cause syntax violations or create too many fields in `Elasticsearch`, causing severe performance problems. Now, users who experience these problems can tune `fluentd` to accommodate their log record fields without errors or `Elasticsearch` performance degradation. (BZ#1686947)\n\nAll OpenShift Container Platform 3.9 users are advised to upgrade to these\nupdated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:0619", "url": "https://access.redhat.com/errata/RHBA-2019:0619" }, { "category": "external", "summary": "1405961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405961" }, { "category": "external", "summary": "1500633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500633" }, { "category": "external", "summary": "1541911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541911" }, { "category": "external", "summary": "1589252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589252" }, { "category": "external", "summary": "1591158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591158" }, { "category": "external", "summary": "1601874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601874" }, { "category": "external", "summary": "1655404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655404" }, { "category": "external", "summary": "1657668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1657668" }, { "category": "external", "summary": "1669965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669965" }, { "category": "external", "summary": "1672847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1672847" }, { "category": "external", "summary": "1679841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679841" }, { "category": "external", "summary": "1684048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684048" }, { "category": "external", "summary": "1684332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684332" }, { "category": "external", "summary": "1686587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686587" }, { "category": "external", "summary": "1689149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689149" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_0619.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 3.9 bug fix update", "tracking": { "current_release_date": "2024-11-05T15:52:55+00:00", "generator": { "date": "2024-11-05T15:52:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHBA-2019:0619", "initial_release_date": "2019-04-09T14:20:41+00:00", "revision_history": [ { "date": "2019-04-09T14:20:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-04-09T14:20:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T15:52:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.9.74-1.git.0.2ab615c.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src", "product_id": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.9.74-1.git.50.93129da.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src", "product": { "name": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src", "product_id": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.9.74-1.git.0.78e56ea.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src", "product": { "name": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src", "product_id": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.9.74-1.git.0.70a0a63.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-1.el7.src", "product": { "name": "ansible-service-broker-0:1.1.20-1.el7.src", "product_id": "ansible-service-broker-0:1.1.20-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker@1.1.20-1.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.9.16-1.git78b2041.el7.src", "product": { "name": "cri-o-0:1.9.16-1.git78b2041.el7.src", "product_id": "cri-o-0:1.9.16-1.git78b2041.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.9.16-1.git78b2041.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.9.74-1.git.0.2ab615c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.9.74-1.git.50.93129da.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-capacity@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-federation-services@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-catalog@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.9.74-1.git.0.78e56ea.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.9.74-1.git.0.b102e93.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-1.el7.x86_64", "product": { "name": "ansible-service-broker-0:1.1.20-1.el7.x86_64", "product_id": "ansible-service-broker-0:1.1.20-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker@1.1.20-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.9.16-1.git78b2041.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.9.16-1.git78b2041.el7.x86_64", "product": { "name": "cri-o-0:1.9.16-1.git78b2041.el7.x86_64", "product_id": "cri-o-0:1.9.16-1.git78b2041.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.9.16-1.git78b2041.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.9.74-1.git.0.78e56ea.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.9.74-1.git.0.78e56ea.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product": { "name": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_id": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.9.74-1.git.0.70a0a63.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_id": "openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-docs@3.9.74-1.git.0.70a0a63.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_id": "openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-roles@3.9.74-1.git.0.70a0a63.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product": { "name": "atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_id": "atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-utils@3.9.74-1.git.0.70a0a63.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-playbooks@3.9.74-1.git.0.70a0a63.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch", "product_id": "ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker-container-scripts@1.1.20-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-0:1.1.20-1.el7.noarch", "product": { "name": "ansible-service-broker-selinux-0:1.1.20-1.el7.noarch", "product_id": "ansible-service-broker-selinux-0:1.1.20-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker-selinux@1.1.20-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.src" }, "product_reference": "ansible-service-broker-0:1.1.20-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.x86_64" }, "product_reference": "ansible-service-broker-0:1.1.20-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-0:1.1.20-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-1.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-0:1.1.20-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src" }, "product_reference": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch" }, "product_reference": "atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-1.git78b2041.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.src" }, "product_reference": "cri-o-0:1.9.16-1.git78b2041.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-1.git78b2041.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.x86_64" }, "product_reference": "cri-o-0:1.9.16-1.git78b2041.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch" }, "product_reference": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src" }, "product_reference": "openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ariel Zelivansky" ], "organization": "Twistlock" } ], "cve": "CVE-2019-1002101", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2019-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685213" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kubernetes via the mishandling of symlinks when copying files from a running container. An attacker could exploit this by convincing a user to use `kubectl cp` or `oc cp` with a malicious container, allowing for arbitrary files to be overwritten on the host machine.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp`", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects Kubernetes starting from version 1.9. OpenShift Container Platform (OCP) versions 3.9 and later are also affected.\n\nThis issue did not affect the version of Kubernetes(embedded in heketi) shipped with Red Hat Gluster Storage 3 as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-1.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src", "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src", "7Server-RH7-RHOSE-3.9:openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1002101" }, { "category": "external", "summary": "RHBZ#1685213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685213" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1002101", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1002101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101" }, { "category": "external", "summary": "https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712", "url": "https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712" } ], "release_date": "2019-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-04-09T14:20:41+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system are applied.\n\nSee the following documentation, which will be updated shortly for release 3.9.74, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-1.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src", "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src", "7Server-RH7-RHOSE-3.9:openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:0619" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-1.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-1.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-1.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.74-1.git.0.b102e93.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.74-1.git.0.78e56ea.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.74-1.git.0.78e56ea.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-utils-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.74-1.git.50.93129da.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-1.git78b2041.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-1.git78b2041.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.74-1.git.0.2ab615c.el7.src", "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-0:3.9.74-1.git.0.70a0a63.el7.src", "7Server-RH7-RHOSE-3.9:openshift-ansible-docs-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-playbooks-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:openshift-ansible-roles-0:3.9.74-1.git.0.70a0a63.el7.noarch", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.74-1.git.0.2ab615c.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp`" } ] }
gsd-2019-1002101
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-1002101", "description": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.", "id": "GSD-2019-1002101", "references": [ "https://www.suse.com/security/cve/CVE-2019-1002101.html", "https://access.redhat.com/errata/RHBA-2019:0636", "https://access.redhat.com/errata/RHBA-2019:0620", "https://access.redhat.com/errata/RHBA-2019:0619", "https://linux.oracle.com/cve/CVE-2019-1002101.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-1002101" ], "details": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.", "id": "GSD-2019-1002101", "modified": "2023-12-13T01:23:52.355009Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "DATE_ASSIGNED": "2019-03-05", "DATE_PUBLIC": "2019-03-28", "ID": "CVE-2019-1002101", "STATE": "PUBLIC", "TITLE": "kubectl cp path traversal" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kubernetes", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.11", "version_value": "1.11.9" }, { "version_affected": "\u003c", "version_name": "1.12", "version_value": "1.12.7" }, { "version_affected": "\u003c", "version_name": "1.13", "version_value": "1.13.5" }, { "version_affected": "=", "version_name": "1.1-1.10", "version_value": "1.1-1.10" } ] } } ] }, "vendor_name": "Kubernetes" } ] } }, "credit": [ { "lang": "eng", "value": "Ariel Zelivansky of Twistlock" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Handling" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kubernetes/kubernetes/pull/75037", "refsource": "MISC", "url": "https://github.com/kubernetes/kubernetes/pull/75037" }, { "name": "107652", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107652" }, { "name": "RHBA-2019:0620", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0620" }, { "name": "RHBA-2019:0619", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0619" }, { "name": "RHBA-2019:0636", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHBA-2019:0636" }, { "name": "FEDORA-2019-bf800b1c04", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/" }, { "name": "[oss-security] 20190620 [ANNOUNCE] Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/21/1" }, { "name": "[oss-security] 20190805 Kubernetes v1.13.9, v1.14.5, v1.15.2 released to address CVE-2019-11247, CVE-2019-11249", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/05/5" }, { "name": "FEDORA-2019-2b8ef08c95", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/" }, { "name": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/", "refsource": "MISC", "url": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/" } ] }, "source": { "advisory": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/OYFV1hiDE2w", "defect": [ "75037" ], "discovery": "EXTERNAL" } }, "gitlab.com": { "advisories": [ { "_git_import_path": "go/github.com/kubernetes/client-go/discovery/cached/disk", "affected_range": "\u003e=v1.11.0 \u003cv1.11.9 || \u003e=v1.12.0 \u003cv1.12.7 || \u003e=v1.13.0 \u003cv1.13.5 || =v1.14.0", "affected_versions": "All versions starting from 1.11.0 before 1.11.9, all versions starting from 1.12.0 before 1.12.7, all versions starting from 1.13.0 before 1.13.5, version 1.14.0", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "cwe_ids": [ "CWE-1035", "CWE-59", "CWE-937" ], "date": "2019-10-22", "description": "The kubectl `cp` command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u0027s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u0027s machine when kubectl `cp` is called, limited only by the system permissions of the local user. The `untar` function can both create and follow symbolic links.", "fixed_versions": [ "v1.14.1" ], "identifier": "CVE-2019-1002101", "identifiers": [ "CVE-2019-1002101" ], "not_impacted": "All versions before 1.11.0, all versions starting from 1.11.9 before 1.12.0, all versions starting from 1.12.7 before 1.13.0, all versions starting from 1.13.5 before 1.14.0, all versions after 1.14.0", "package_slug": "go/github.com/kubernetes/client-go", "pubdate": "2019-04-01", "solution": "Upgrade to version kubernetes-1.16.2 or above.", "title": "Improper Link Resolution Before File Access", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101", "http://www.securityfocus.com/bid/107652" ], "uuid": "5a90e146-6740-4f3d-b256-f2e583c12822", "versions": [ { "commit": { "sha": "7a66677755f880f16034b3785c75f4b21bfa9ed9", "tags": [ "kubernetes-1.11.0" ], "timestamp": "20180628063050" }, "number": "v1.11.0" }, { "commit": { "sha": "abcb3a804c4b8d680921d3d4cc5dda6aa8df9995", "tags": [ "kubernetes-1.12.0" ], "timestamp": "20181004144242" }, "number": "v1.12.0" }, { "commit": { "sha": "c1f6f3b37bf498dd1de36cdb374019fe258a835e", "tags": [ "kubernetes-1.13.0" ], "timestamp": "20181204010744" }, "number": "v1.13.0" }, { "commit": { "sha": "88a0b773c8d38fb242e0401847bb36c673aa21ed", "tags": [ "kubernetes-1.13.5" ], "timestamp": "20190307171346" }, "number": "v1.13.5" }, { "commit": { "sha": "0aa5eab985ac602d9911b5dae9fc82c778f0bf7a", "tags": [ "kubernetes-1.14.0" ], "timestamp": "20190314005726" }, "number": "v1.14.0" }, { "commit": { "sha": "28b8198e1cd15cd717798754e106063f7b41e619", "tags": [ "kubernetes-1.12.7" ], "timestamp": "20190325155348" }, "number": "v1.12.7" }, { "commit": { "sha": "8306de303f6f137ac04b881f0fe6cd94ef6dc34b", "tags": [ "kubernetes-1.11.9" ], "timestamp": "20190325195812" }, "number": "v1.11.9" }, { "commit": { "sha": "39bdd41acd22264d8c791bf01cd7c85281f13b4d", "tags": [ "kubernetes-1.14.1" ], "timestamp": "20190409041438" }, "number": "v1.14.1" } ] }, { "affected_range": "\u003c1.11.9||\u003e=1.12.0 \u003c1.12.7||\u003e=1.13.0 \u003c1.13.5", "affected_versions": "All versions before 1.11.9, all versions starting from 1.12.0 before 1.12.7, all versions starting from 1.13.0 before 1.13.5", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-59", "CWE-937" ], "date": "2022-04-12", "description": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.", "fixed_versions": [ "1.11.9", "1.12.7", "1.13.5" ], "identifier": "CVE-2019-1002101", "identifiers": [ "GHSA-34jx-wx69-9x8v", "CVE-2019-1002101" ], "not_impacted": "All versions starting from 1.11.9 before 1.12.0, all versions starting from 1.12.7 before 1.13.0, all versions starting from 1.13.5", "package_slug": "go/github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp", "pubdate": "2022-02-15", "solution": "Upgrade to versions 1.11.9, 1.12.7, 1.13.5 or above.", "title": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101", "https://github.com/kubernetes/kubernetes/pull/75037", "https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013", "https://access.redhat.com/errata/RHBA-2019:0619", "https://access.redhat.com/errata/RHBA-2019:0620", "https://access.redhat.com/errata/RHBA-2019:0636", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/", "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/", "http://www.openwall.com/lists/oss-security/2019/06/21/1", "http://www.openwall.com/lists/oss-security/2019/08/05/5", "http://www.securityfocus.com/bid/107652", "https://github.com/advisories/GHSA-34jx-wx69-9x8v" ], "uuid": "837d9696-df8a-4143-a264-2fc83102a97e" }, { "_git_import_path": "go/k8s.io/kubernetes/pkg/kubectl/cmd/cp", "affected_range": "\u003e=1.11.0 \u003c1.11.9||\u003e=1.12.0 \u003c1.12.7||\u003e=1.13.0 \u003c1.13.5||=1.14.0", "affected_versions": "All versions starting from 1.11.0 before 1.11.9, all versions starting from 1.12.0 before 1.12.7, all versions starting from 1.13.0 before 1.13.5, version 1.14.0", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-59", "CWE-937" ], "date": "2019-10-22", "description": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user?s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u0027s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links.", "fixed_versions": [ "1.11.9", "1.12.7", "1.13.5", "1.14.1-beta.0" ], "identifier": "CVE-2019-1002101", "identifiers": [ "CVE-2019-1002101" ], "not_impacted": "All versions before 1.11.0, all versions starting from 1.11.9 before 1.12.0, all versions starting from 1.12.7 before 1.13.0, all versions starting from 1.13.5 before 1.14.0, all versions after 1.14.0", "package_slug": "go/k8s.io/kubernetes/pkg/kubectl/cmd/cp", "pubdate": "2019-04-01", "solution": "Upgrade to versions 1.11.9, 1.12.7, 1.13.5, 1.14.1-beta.0 or above.", "title": "Improper Link Resolution Before File Access", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101", "http://www.securityfocus.com/bid/107652" ], "uuid": "f4ba04ef-33b2-45af-ae84-721505ea7c7b" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.13.5", "versionStartIncluding": "1.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.12.7", "versionStartIncluding": "1.12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.11.9", "versionStartIncluding": "1.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:1.14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1002101" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-59" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kubernetes/kubernetes/pull/75037", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/pull/75037" }, { "name": "107652", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107652" }, { "name": "CVE-2019-1002101", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2019-1002101" }, { "name": "RHBA-2019:0620", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHBA-2019:0620" }, { "name": "RHBA-2019:0619", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHBA-2019:0619" }, { "name": "RHBA-2019:0636", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHBA-2019:0636" }, { "name": "FEDORA-2019-bf800b1c04", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/" }, { "name": "[oss-security] 20190620 [ANNOUNCE] Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2019/06/21/1" }, { "name": "[oss-security] 20190805 Kubernetes v1.13.9, v1.14.5, v1.15.2 released to address CVE-2019-11247, CVE-2019-11249", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2019/08/05/5" }, { "name": "FEDORA-2019-2b8ef08c95", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/" }, { "name": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/", "refsource": "MISC", "tags": [], "url": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2020-02-10T21:49Z", "publishedDate": "2019-04-01T14:29Z" } } }
ghsa-34jx-wx69-9x8v
Vulnerability from github
Published
2022-02-15 01:57
Modified
2023-09-18 19:40
Severity ?
Summary
Symlink Attack in kubectl cp
Details
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "k8s.io/kubernetes" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.11.9" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "k8s.io/kubernetes" }, "ranges": [ { "events": [ { "introduced": "1.12.0" }, { "fixed": "1.12.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "k8s.io/kubernetes" }, "ranges": [ { "events": [ { "introduced": "1.13.0" }, { "fixed": "1.13.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-1002101" ], "database_specific": { "cwe_ids": [ "CWE-59" ], "github_reviewed": true, "github_reviewed_at": "2021-05-19T21:58:27Z", "nvd_published_at": null, "severity": "MODERATE" }, "details": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user\u2019s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u2019s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.", "id": "GHSA-34jx-wx69-9x8v", "modified": "2023-09-18T19:40:25Z", "published": "2022-02-15T01:57:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1002101" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/75037" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHBA-2019:0619" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHBA-2019:0620" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHBA-2019:0636" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F" }, { "type": "WEB", "url": "https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/06/21/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/08/05/5" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/107652" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Symlink Attack in kubectl cp" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.