Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-24750
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:09.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:22:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24750", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FasterXML/jackson-databind/issues/2798", "refsource": "MISC", "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b", "refsource": "CONFIRM", "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "name": "https://security.netapp.com/advisory/ntap-20201009-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-24750", "datePublished": "2020-09-17T18:39:40", "dateReserved": "2020-08-28T00:00:00", "dateUpdated": "2024-08-04T15:19:09.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-24750\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-09-17T19:15:13.580\",\"lastModified\":\"2024-11-21T05:16:00.667\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.\"},{\"lang\":\"es\",\"value\":\"FasterXML jackson-databind versiones 2.x anteriores a 2.9.10.6, maneja inapropiadamente la interacci\u00f3n entre los gadgets de serializaci\u00f3n y la escritura, relacionada con com.pastdev.httpcomponents.configuration.JndiConfiguration\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"2.6.7.5\",\"matchCriteriaId\":\"4892ABAA-57A0-43D3-965C-2D7F4A8A6024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.9.10.6\",\"matchCriteriaId\":\"96DBACC5-AC30-4F2A-9615-DDC912A188B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C650FEDB-E903-4C2D-AD40-282AB5F2E3C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A125E817-F974-4509-872C-B71933F42AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97994257-C9A4-4491-B362-E8B25B7187AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF9A061-2421-426D-9854-0A4E55B2961D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F95EDC3D-54BB-48F9-82F2-7CCF335FCA78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72B735F-4E52-484A-9C2C-23E6E2070385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B36A1D4-F391-4EE3-9A65-0A10568795BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55116032-AAD1-4FEA-9DA8-2C4CBD3D3F61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0275F820-40BE-47B8-B167-815A55DF578E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7FC2BF9-B6D7-420E-9CF5-21AB770B9CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DAB919-54FD-48F8-A664-CD85C0A4A0E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5A1417-2C59-431F-BF5C-A2BCFEBC95FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8420D4-AAF1-44AA-BF28-48EE3ED310B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FB80AC5-35F2-4703-AD93-416B46972EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DAAEFF-AB4A-4D0D-8C86-D2F2811B53B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.2\",\"matchCriteriaId\":\"D0DBC938-A782-433F-8BF1-CA250C332AA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D55AB36-EDBB-4644-9579-21CE8278ED77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46059231-E7F6-4402-8119-1C7FE4ABEA96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE6D7E4F-FB11-4CED-81DB-D0BD21797C53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D01A0BBC-DA0E-4AFE-83BF-4F3BA01653EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.2.2\",\"matchCriteriaId\":\"526E2FE5-263F-416F-8628-6CD40B865780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.2.0\",\"versionEndIncluding\":\"8.2.4.0\",\"matchCriteriaId\":\"0331877D-D5DB-4EE8-8220-C1CDC3F90CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4A94B36-479F-48F2-9B9E-ACEA2589EF48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1214FDF-357A-4BB9-BADE-50FB2BD16D10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49ACFC73-A509-4D1C-8FC3-F68F495AB055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5312AC7A-3C16-4967-ACA6-317289A749D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28F42F0-FBDA-4574-AD30-7A04F27FEA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"062E4E7C-55BB-46F3-8B61-5A663B565891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0.0\",\"versionEndIncluding\":\"8.2.2.1\",\"matchCriteriaId\":\"FB3E2625-08F0-4C8E-B43F-831F0290F0D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.2.0\",\"versionEndIncluding\":\"8.2.2.1\",\"matchCriteriaId\":\"F5AA3C04-30A4-4975-B878-C5777F8BB918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7637F8B-15F1-42E2-BE18-E1FF7C66587D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EA92D-9F26-4292-991A-891597337DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"21.5\",\"matchCriteriaId\":\"F9C855EA-6E35-4EFF-ADEB-0EDFF90272BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"21.2\",\"matchCriteriaId\":\"0D9E0011-6FF5-4C90-9780-7A1297BB09BF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FasterXML/jackson-databind/issues/2798\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20201009-0003/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FasterXML/jackson-databind/issues/2798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20201009-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
gsd-2020-24750
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-24750", "description": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.", "id": "GSD-2020-24750", "references": [ "https://www.suse.com/security/cve/CVE-2020-24750.html", "https://access.redhat.com/errata/RHSA-2021:1515", "https://access.redhat.com/errata/RHSA-2021:1230", "https://access.redhat.com/errata/RHSA-2020:5635", "https://access.redhat.com/errata/RHSA-2020:4173" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-24750" ], "details": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.", "id": "GSD-2020-24750", "modified": "2023-12-13T01:22:12.079815Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24750", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FasterXML/jackson-databind/issues/2798", "refsource": "MISC", "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b", "refsource": "CONFIRM", "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "name": "https://security.netapp.com/advisory/ntap-20201009-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[2.9.0,2.9.10.6)", "affected_versions": "All versions starting from 2.9.0 before 2.9.10.6", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-502", "CWE-937" ], "date": "2021-12-10", "description": "FasterXML jackson-databind mishandles the interaction between serialization gadgets and typing, related to `com.pastdev.httpcomponents.configuration.JndiConfiguration`", "fixed_versions": [ "2.9.10.6" ], "identifier": "CVE-2020-24750", "identifiers": [ "CVE-2020-24750" ], "not_impacted": "All versions before 2.9.0, all versions starting from 2.9.10.6", "package_slug": "maven/com.fasterxml.jackson.core/jackson-databind", "pubdate": "2020-09-17", "solution": "Upgrade to version 2.9.10.6 or above.", "title": "Deserialization of Untrusted Data", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-24750", "https://github.com/FasterXML/jackson-databind/issues/2798" ], "uuid": "9359314c-368f-4a2f-9016-c0d15acc0c3b" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.6.7.5", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.9.10.6", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "21.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.4.0", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "21.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2.1", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2.1", "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.1.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-24750" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-502" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FasterXML/jackson-databind/issues/2798", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "name": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "name": "https://security.netapp.com/advisory/ntap-20201009-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } }, "lastModifiedDate": "2023-09-13T14:56Z", "publishedDate": "2020-09-17T19:15Z" } } }
rhsa-2020_4173
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-maven35-jackson-databind is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.\n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4173", "url": "https://access.redhat.com/errata/RHSA-2020:4173" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4173.json" } ], "title": "Red Hat Security Advisory: rh-maven35-jackson-databind security update", "tracking": { "current_release_date": "2024-11-24T21:20:43+00:00", "generator": { "date": "2024-11-24T21:20:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4173", "initial_release_date": "2020-10-05T15:14:20+00:00", "revision_history": [ { "date": "2020-10-05T15:14:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-05T15:14:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T21:20:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "product": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "product_id": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-maven35-jackson-databind@2.7.6-2.11.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "product": { "name": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "product_id": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-maven35-jackson-databind-javadoc@2.7.6-2.11.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "product": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "product_id": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-maven35-jackson-databind@2.7.6-2.11.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src" }, "product_reference": "rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" }, "product_reference": "rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24750", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882310" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24750" }, { "category": "external", "summary": "RHBZ#1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750" } ], "release_date": "2020-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-05T15:14:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4173" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-Alt-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Server-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-0:2.7.6-2.11.el7.src", "7Workstation-RHSCL-3.5:rh-maven35-jackson-databind-javadoc-0:2.7.6-2.11.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration" } ] }
rhsa-2021_1230
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.6.26 is now available with\nupdates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container\nPlatform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* jackson-databind: arbitrary code execution in slf4j-ext class (CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: improper polymorphic deserialization in axis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class (CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in jboss-common-core class (CVE-2018-19362)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-35490)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource (CVE-2020-35491)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-35728)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36179)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36180)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36181)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36182)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-36183)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-36184)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource (CVE-2020-36185)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource (CVE-2020-36186)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource (CVE-2020-36187)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource (CVE-2020-36188)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource (CVE-2020-36189)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing (CVE-2021-20190)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class (CVE-2018-14721)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1230", "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "1859004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859004" }, { "category": "external", "summary": "1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "external", "summary": "1909266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909266" }, { "category": "external", "summary": "1909269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909269" }, { "category": "external", "summary": "1911502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911502" }, { "category": "external", "summary": "1913871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913871" }, { "category": "external", "summary": "1913872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913872" }, { "category": "external", "summary": "1913874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913874" }, { "category": "external", "summary": "1913926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913926" }, { "category": "external", "summary": "1913927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913927" }, { "category": "external", "summary": "1913928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913928" }, { "category": "external", "summary": "1913929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913929" }, { "category": "external", "summary": "1913931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913931" }, { "category": "external", "summary": "1913933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913933" }, { "category": "external", "summary": "1913934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913934" }, { "category": "external", "summary": "1913937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913937" }, { "category": "external", "summary": "1916633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633" }, { "category": "external", "summary": "1925361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925361" }, { "category": "external", "summary": "1950894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950894" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1230.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.26 security and extras update", "tracking": { "current_release_date": "2024-11-25T10:37:24+00:00", "generator": { "date": "2024-11-25T10:37:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1230", "initial_release_date": "2021-04-27T08:55:01+00:00", "revision_history": [ { "date": "2021-04-27T08:55:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-27T08:55:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T10:37:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "product": { "name": "openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "product_id": "openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "product_id": "openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "product_id": "openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "product": { "name": "openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "product_id": "openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "product": { "name": "openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "product_id": "openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "product": { "name": "openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "product_id": "openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch6\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "product": { "name": "openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "product_id": "openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-eventrouter\u0026tag=v4.6.0-202104201259.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "product": { "name": "openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "product_id": "openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "product": { "name": "openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "product_id": "openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "product_id": "openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "product": { "name": "openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "product_id": "openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "product": { "name": "openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "product_id": "openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "product_id": "openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "product": { "name": "openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "product_id": "openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "product": { "name": "openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "product_id": "openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "product_id": "openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "product_id": "openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "product": { "name": "openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "product_id": "openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "product_id": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-10-rhel8\u0026tag=v4.6.0-202104151601.p0" } } }, { "category": "product_version", "name": "openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "product": { "name": "openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "product_id": "openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-leader-elector-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "product": { "name": "openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "product_id": "openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "product": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "product_id": "openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-metering-helm-container-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "product": { "name": "openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "product_id": "openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "product": { "name": "openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "product_id": "openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "product": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "product_id": "openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-operator-must-gather\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "product_id": "openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "product_id": "openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.6.0-202104151245.p0" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "product_id": "openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "product_id": "openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "product_id": "openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "product": { "name": "openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "product_id": "openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ghostunnel\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "product": { "name": "openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "product_id": "openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-hadoop\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "product": { "name": "openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "product_id": "openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-hive\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "product_id": "openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "product": { "name": "openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "product_id": "openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "product": { "name": "openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "product_id": "openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch6\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "product": { "name": "openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "product_id": "openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-eventrouter\u0026tag=v4.6.0-202104201259.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "product": { "name": "openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "product_id": "openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "product": { "name": "openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "product_id": "openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "product_id": "openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "product_id": "openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "product": { "name": "openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "product_id": "openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "product": { "name": "openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "product_id": "openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "product_id": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-10-rhel8\u0026tag=v4.6.0-202104151601.p0" } } }, { "category": "product_version", "name": "openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "product": { "name": "openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "product_id": "openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-leader-elector-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "product": { "name": "openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "product_id": "openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "product": { "name": "openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "product_id": "openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-ansible-operator\u0026tag=v4.6.0-202104151601.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "product": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "product_id": "openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-helm-container-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "product": { "name": "openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "product_id": "openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-reporting-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "product": { "name": "openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "product_id": "openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "product": { "name": "openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "product_id": "openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-presto\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "product": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "product_id": "openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-operator-must-gather\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "product_id": "openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.6.0-202104151245.p0" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "product": { "name": "openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "product_id": "openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "product_id": "openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "product_id": "openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "product": { "name": "openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "product_id": "openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "product": { "name": "openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "product_id": "openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "product": { "name": "openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "product_id": "openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch6\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "product": { "name": "openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "product_id": "openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-eventrouter\u0026tag=v4.6.0-202104201259.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "product": { "name": "openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "product_id": "openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "product": { "name": "openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "product_id": "openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.6.0-202104161407.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "product_id": "openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "product": { "name": "openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "product_id": "openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "product": { "name": "openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "product_id": "openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "product_id": "openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "product": { "name": "openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "product_id": "openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "product": { "name": "openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "product_id": "openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "product_id": "openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "product_id": "openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "product": { "name": "openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "product_id": "openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-proxy\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "product_id": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-10-rhel8\u0026tag=v4.6.0-202104151601.p0" } } }, { "category": "product_version", "name": "openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "product": { "name": "openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "product_id": "openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-leader-elector-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "product": { "name": "openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "product_id": "openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "product": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "product_id": "openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-metering-helm-container-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "product": { "name": "openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "product_id": "openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "product": { "name": "openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "product_id": "openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "product": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "product_id": "openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-operator-must-gather\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "product_id": "openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.6.0-202104151245.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "product_id": "openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.6.0-202104151245.p0" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le" }, "product_reference": "openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x" }, "product_reference": "openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le" }, "product_reference": "openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x" }, "product_reference": "openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le" }, "product_reference": "openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x" }, "product_reference": "openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x" }, "product_reference": "openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64" }, "product_reference": "openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le" }, "product_reference": "openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64" }, "product_reference": "openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x" }, "product_reference": "openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64" }, "product_reference": "openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le" }, "product_reference": "openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x" }, "product_reference": "openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le" }, "product_reference": "openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64" }, "product_reference": "openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x" }, "product_reference": "openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64" }, "product_reference": "openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le" }, "product_reference": "openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64" }, "product_reference": "openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le" }, "product_reference": "openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" }, "product_reference": "openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64" }, "product_reference": "openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le" }, "product_reference": "openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x" }, "product_reference": "openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64" }, "product_reference": "openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64" }, "product_reference": "openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le" }, "product_reference": "openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64" }, "product_reference": "openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x" }, "product_reference": "openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64" }, "product_reference": "openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64" }, "product_reference": "openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64" }, "product_reference": "openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x" }, "product_reference": "openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le" }, "product_reference": "openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x" }, "product_reference": "openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64" }, "product_reference": "openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le" }, "product_reference": "openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le" }, "product_reference": "openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x" }, "product_reference": "openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le" }, "product_reference": "openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x" }, "product_reference": "openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64" }, "product_reference": "openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2020-24750", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-09-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882310" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24750" }, { "category": "external", "summary": "RHBZ#1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750" } ], "release_date": "2020-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration" }, { "cve": "CVE-2020-35490", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1909266" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35490" }, { "category": "external", "summary": "RHBZ#1909266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909266" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35490", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35490" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2986", "url": "https://github.com/FasterXML/jackson-databind/issues/2986" } ], "release_date": "2020-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-35491", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1909269" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35491" }, { "category": "external", "summary": "RHBZ#1909269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909269" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35491", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2986", "url": "https://github.com/FasterXML/jackson-databind/issues/2986" } ], "release_date": "2020-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-35728", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-27T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1911502" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat Products ship jackson-databind version 2.10.0 or later which is not considered affected by this CVE (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba) \n* JBoss Data Grid 7\n* JBoss Data Grid 8\n* Enterprise Application Platform 7\n* Red Hat Decision Manager 7\n* Red Hat Process Automation Manager 7\n* Red Hat Single Sign-On (RH-SSO) 7\n* Red Hat JBoss Fuse 7\n* Red Hat JBoss A-MQ\n* Red Hat Enterprise Linux 8\n* Red Hat Satellite 6.6\n* Red Hat Satellite 6.7\n* Red Hat Satellite 6.8\n* Red Hat CodeReady Studio 12\n\nRed Hat OpenShift Container Platform and Red Hat OpenStack Platform does ship the vulnerable components, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nRed Hat OpenStack Platform 13 ships OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35728" }, { "category": "external", "summary": "RHBZ#1911502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35728", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35728" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2999", "url": "https://github.com/FasterXML/jackson-databind/issues/2999" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool in the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-36179", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913871" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36179" }, { "category": "external", "summary": "RHBZ#1913871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36179", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36179" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36180", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913872" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36180" }, { "category": "external", "summary": "RHBZ#1913872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36180", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36181", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913874" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36181" }, { "category": "external", "summary": "RHBZ#1913874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36181", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36182", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913926" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36182" }, { "category": "external", "summary": "RHBZ#1913926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913926" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36182", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36183", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913927" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36183" }, { "category": "external", "summary": "RHBZ#1913927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36183", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3003", "url": "https://github.com/FasterXML/jackson-databind/issues/3003" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-36184", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913928" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36184" }, { "category": "external", "summary": "RHBZ#1913928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913928" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36184", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2998", "url": "https://github.com/FasterXML/jackson-databind/issues/2998" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-36185", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913929" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36185" }, { "category": "external", "summary": "RHBZ#1913929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36185", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2998", "url": "https://github.com/FasterXML/jackson-databind/issues/2998" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-36186", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913931" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36186" }, { "category": "external", "summary": "RHBZ#1913931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36186", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2997", "url": "https://github.com/FasterXML/jackson-databind/issues/2997" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-36187", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913933" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36187" }, { "category": "external", "summary": "RHBZ#1913933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36187", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2997", "url": "https://github.com/FasterXML/jackson-databind/issues/2997" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-36188", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913934" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but they do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36188" }, { "category": "external", "summary": "RHBZ#1913934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36188", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2996", "url": "https://github.com/FasterXML/jackson-databind/issues/2996" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource" }, { "cve": "CVE-2020-36189", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913937" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36189" }, { "category": "external", "summary": "RHBZ#1913937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36189", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2996", "url": "https://github.com/FasterXML/jackson-databind/issues/2996" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource" }, { "cve": "CVE-2021-20190", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1916633" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* CodeReady WorkSpaces Server Container\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20190" }, { "category": "external", "summary": "RHBZ#1916633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-5949-rw7g-wx7w", "url": "https://github.com/advisories/GHSA-5949-rw7g-wx7w" } ], "release_date": "2021-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-27T08:55:01+00:00", "details": "This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.26. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1232\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor\n\nFor OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1230" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid javax.swing in the classpath", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:1bdf5505b33880666b5e98af98e2237702b7ba879684844cd0c867a6a4535752_amd64", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:a065f31ff3d4583d5346dacfdb82fc1676ebc6a66c8ab6f91b5317b20bee2922_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ansible-operator@sha256:e08c21810d029d1c44468e63a51da715540620b942bb258b4d46f266ba11adf2_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:757a8fc6c74fb58ee8e4342e0a01b6613b0db4bc5358f7a3bd7648357c1d2d2f_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:7c0735d650dbcd648c34decf07468a211a486a154353826e2d21c507bd9e09b1_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity@sha256:a356b236981577ff562886ac80bbc94d5b3177b31a01e12a709fa8706f3a0bef_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:085a4280161e972baf1c7117f5f3c2f85ec5f7a02aece451977cc0d40970e02c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:aee746eaf43c085f305c81ad840e9e93b93ae4c8d4f7d399104fa823a5854494_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f5abc71afc0108cc68d115f088da4a0f409c569b29af250da3071d2b09246c1a_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:56785d26ee764d5845daa0a40ed166d90899df92eda0a571244990a0198f90fb_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:6ac5fdc243dd9c9f394409b019c3e3f223f3a8988e92449722267a4ede3f71e5_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:b649cce6850bf161b93a5f6e46b160c5dd1f953b5c6b86962812a3d68c288c84_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:3a8dd6b9d8ba07b7a7465624097ae5f96cb418b7eaf4d7f20d67051eb43f24c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:44261c4897b6cb25e540a29d9a7e0255e09077897349f253a341c2a62bc40b57_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-nfd-operator@sha256:70c6f5a0b4024fb47ea18454d79a550cd3bef22371954dbfa88996c56bc54fbc_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:36810ff04906b074fe509d744b121c05c58e7b3065cad7e6c31c61cb5e5bf827_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:ca1d1b3e37ba0902750b55aabc3243699ab700d4808bf7da0d409b6ab536f5be_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f93a04e4d827f2a403ec5cf42883b39eeca85bc836793c22ec8e85f6b6655d7f_s390x", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3e58d28b4ff0eea028d80f10d182e0d131105215e47ba2460d7d387fc3589fb1_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:3f90d6cc032e068c41fa90abe60a39bea595a77c07c6b6fe1e5bbe26142d1d66_amd64", "8Base-RHOSE-4.6:openshift4/ose-clusterresourceoverride-rhel8@sha256:e03bbf11d2142e7d8090993de9934fc13fee4c583e0d05079c8b7550d7fe7bff_s390x", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:4d73f8db16aac6881680b4c7ee49449f2cc9a79d536ce6ffda4621abb45f2bdb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:8b069b2c625c6c8281bdbd7e957f48d0e1407c9087a9277cf2c176daf4564c25_amd64", "8Base-RHOSE-4.6:openshift4/ose-descheduler@sha256:ce14ed3c5e3a6b5ccf42feea4d5895150586d12e30ed42496809cc94ea7fabb6_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:515d077af11b0769686a97d6796a115c4a177d1986da9f584a1e3a3c0e9584f6_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:6a090568a5cf1d9fa225e67f37b0e11243764f35c922b1fcc3a62cdbe83c56d7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:e5cc34ca2bc012691523e0cc7b42a7e17c39e5361c62df0ef3a39a9031417d34_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:3399a5fd27c1b7648876c595601ba14a98cb5c3d0a949e41900e4cbe8f0da3c3_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:654d2f58de1b46a7562230227f5eab0613f4fd51ffa783edb7decc858dfd656f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-http-proxy@sha256:7d4cb10f88df3911cd701a201348cb21c071a22af346a54a924d3eaa41bc107d_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:a12fc7f1d200e940461b7106842e7ad7ce5fcaee55ee5beab682f071084533fb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:dca8ab53f80bc9d747972375df8a755d3f83bbadb7f6347197a378244349e79a_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-router@sha256:efd14fb77f38de3da3e58409d53a752c031263d016968c5754c9d8278500507a_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:1ad4acfbb39b1b47d1ee7e767af27978676ee36a68ed29fe97d3c4b687945e20_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:5c312b851727c3147f17e4fd338338c048b376fe8292faba78e8438d24fd5a65_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:a7abe377cef9fa7a7de502ee8ff0e65f95498b767e70dad6f019e692d90d2669_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:5409839ffacc3dbb6c298e74cc87ff26204739c1a479ee4d91fe5d8ef6067d0d_s390x", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:a5147e29b0eb6dab75e73157d251d36d79d4dfb39597e8328e8278bdc9b1c861_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-proxy@sha256:b3467f3aad92908ec40fe7629ded3fcd988532a290559c0eed336334329a2d6f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ghostunnel@sha256:b13706a50a922bef15e92aca6a12defb0279e87cba0935ce1a67f16aa990cd80_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:08cda24e19694136030db6789321427e3a968ed50ec3d9bcca4faeac751ff4de_s390x", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:6a69ed6850e1490476a3ea2ec9aaf82b8e0894a2adbcfb69f97a5a627b20b7b0_amd64", "8Base-RHOSE-4.6:openshift4/ose-helm-operator@sha256:ae32f068111571934ef138a0b22aa48f78dca77d341bed79493bb90dfe33c647_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:6ff45bdab177dcdd1c0d1c4a0565bc3c26abc0f293cab100f293cc6d56cd6b9d_s390x", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:a976c7c292f57e51ccb5d5bc1cec517ac4943e6e359c0b5f641c15c7e810613f_amd64", "8Base-RHOSE-4.6:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:ac528fb371439b930e85f14596c9b2b9bb444c1d239a76f8b85d77154221e9bf_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:042b975cc17845ec8401cb1c0e238b93b9848fdaa70f8fd0223bb3502045275c_s390x", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:05f814322fd10d44f5a55349dffdd8799405548d7e22eef8684ac1fd5f29e520_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-leader-elector-rhel8@sha256:f6bf928d08e987dab59e0725d35a3a381606a43fd859968fd58c025c82459a53_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:02284a2cc9dda7f6dedb9639b9a9eb9aedb1db9bcd0f01ee4783148feb8c05b9_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:75aa707a412f8b5831d3c4582b50d904c663e68d9518e804ae316394fbbb4659_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker@sha256:d38d452640972e9be7eda63dd5cf72905d8d0b6dd58bc2b33a24390ff80d642c_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:80e14ac7ed9872072360b5ce69038a42715ff206f784a320849b37382ce99a58_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:b7b60a5e88ae9a175e6bdf17b5bcae36869d66f11e3d885410d833b5d9beda49_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-operator@sha256:d0c6e09c52fd11ddd1f21e50166235be92a1c3372363e21e46bfbbe0ddcf3c28_s390x", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:50e877f4960850233e6599b08f60d8e906a55304fb1bf48117314415eeae207c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:7ce7f03282fe08e8e81f8ac6ebcc1c28f11413b5b010c662015047ef06a3afa2_amd64", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner@sha256:fa1818b5b30a2e01a437776132d84b755f0874a6057b54168bd4a4394ff56fae_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:0ab8cee837a9d3b8d9755a2c263abee7f24d3c75fa167603f1abf766c9773a07_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:78ba74c7df36e8e93706cfafbc359791fa248d80d7f042ce5a9a6f3512a4db57_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:c6b29177495d738d050dd2068a912230d6047418c3bce7400122e7b357d6961b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:304643c6dd114296767299e9c9137b971531ac7d3b5c878b4ee58e4b0fa6e0f7_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:37a37378b9057f79d8cdd811170915d039412242789164f67d44dd5bf572b97a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-eventrouter@sha256:ffd51d07eda4cc9ce64d814ef3084cdee943cbf42c84851731961766bd1bc029_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:49f7c6b1c3a24a42fbaa761cc5003e7f6402a2413679100ab9050897349641b4_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:56f47b1069a1bd851f042e51e5a8927682dcd6035666f207b466366bdf165197_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:bb1b69978de71d2bf2dc3d331e46b85e31cf02d677ec43ebf69124e8106960db_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:249d582984f1b707af646e720d8d781d6bbf27f93e48b97f6f7611224b554d2b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:6f1e9ae360bc838a5c35a83d1053ca998c12dbffc67680a11cc0d83012d0a37c_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:bfb0ca212cfa49a4c810a1259129b10ea1fff0c1b4e75007b295c9033fe15f69_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:da5c6bd0ae0f0d79d160dfd3f5e2742f35d7847c832814077546e93865836b96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:faeea3b7ed8da083b5f7664a9a34aec46997fc7baa80f2008594f343db179148_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:2c7ae009af86100937e973ed1a26ac8d1db41f6c6b7183763a89b934fb6b0913_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:31f9bde9a154b412dd23c03bd86e2bcd061b78de216c95b4042a322f5eb64c02_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-helm-container-rhel8@sha256:ac8512ae42adb14d219ea98bf3020edd27eed755f3bf08e0bfed7dd32431c381_s390x", "8Base-RHOSE-4.6:openshift4/ose-metering-hive@sha256:b9eee2133d8ff69c1fd3fb3f8a7ee72552acc252d7f3ab923efac99a434e0f31_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:50e94f1ac582febf4079692b9976bdc3c3f321ce2769683c82f3dc34005c5eba_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator@sha256:669ce13592f3fd0072efa2a41b4d64377d2c251b8504a81aea06957e87e99e54_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:8bf45ae929309726b54fdd77ae7c185a5feaa0ffc5ed047d89ebef94670ccc33_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:a6fd5a2fb8cce9cc4ce8a4af247988c743a56cdaed0ee64479592f243f5b7e71_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-feature-discovery@sha256:ca3599f758489397d4084d6d173df9276f085fdcd477bb8ea94ff86ba104a494_s390x", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:5e1dcd44213b8f5c3880ec48196411c940ec6081bcc03d3266606a18f943daf2_amd64", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:760b502ef140b58c561bf214a1f4d741607a70a7769698cd5b7d53d5147eff3a_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-node-problem-detector-rhel8@sha256:f9e602126fd16d7a3238c21f0b9686552c7fb4317ad3992af9ab0fdf584a57eb_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:228f2db298ffcf59b31b4bfdbe453a12d6a3ba7e5d5c73bb59b9f07e1c2c2b6b_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:24316f0f7fe027e79f22a70e4b9e3c9e59c00797e294479fc1e6467b8c25d6f0_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator@sha256:36be231e5880803af44ebdb1961e09d02c70dde9fb0451e4fd0fd02179f64df3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:1a8909d642b2d50377c9dcaaf002910cc06f1d63caf9974649b245313412119f_s390x", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:82c0a0feaea44b06965173cddd5855b226b86e93efa381fbc47b3a39ca89bd4a_amd64", "8Base-RHOSE-4.6:openshift4/ose-ptp@sha256:ecae2687ff6331ce13a2b4284a2bf255e3c5d189f7a5f43ea592194baaed7f14_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:23eb91e03d61a80356f5d565cf278efd81c988803b064b7b1d764a3d711f110d_s390x", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:6661e36e02108e365a0d753666497dcfb7cdc36a9be79668431d5c7349f4953d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-service-idler-rhel8@sha256:c480428f630fc2b3f63f58d81e130c60cd19fd339c6ae42aca56f25753edba03_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:64bd62efe56d6cb37306b5826a9c9c9571a0c7847405915e3f91abf96986a658_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:a5958940d84fd1e6df3b6d751f5b7872b4e00e69aba6d7dff371ab399c4789a2_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-cni@sha256:e42537341cae4334358aa4eb42ad4178e3a8cce31edd1db2c7a4213bd5068e37_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:15a317aa3f2f95a53987d392c7d75a91bfc463430987ff16f0b5524caa6adcfa_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:7e692a1bc16d7e7af6e24f1a50404a5675349dbf65cc55062d9b6441f2c4a297_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller@sha256:85ae9a6bf8ea721b74562a233e20c247ca45e753f5a5791cee65baed4dca4795_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:1a96bd0cbaf6c6430f536194e88f759453c788df9efa74777ebaba9be246a412_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:68e6f203ca6af18626c70a9814c62002d15096a309cecfb76ec3db6a75fb85cb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-infiniband-cni@sha256:cc01feddc8c34993e9f77bfba0d01a2c3fc19967b5715e3797cb67046f8e526d_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:3c338f2cd2e864f9a735964ba0c6d999eca0f0b53e4046cffd41a86b2841f160_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:b9842f153e49120c9a45fae9672218fb31736927c61fbed8eab5fc7b3ed46e24_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon@sha256:d2d43d08cdec41fc8acb00db726fdfcf121f48ba16e9201fc79652a7065d9c2e_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:4480925a79945775f5e628e38e1d45ab6c47e31712a6036ce5b8fc1de8c46f92_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:a6728c67b2f285c5e76a196e1cd75d35b8c156db38a02c810e128fdf55918745_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin@sha256:c4672d079b33ec68db2f2f09c62de4051b1be52272b5f324ba9addf4a5c1d0af_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2080923bae6822d1c0e42373834250132ee598c9a374ff4d62e1d4913026c529_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:2853cfd3e94434c0ae8e171b493c3650bb5ef4407cdc3c2bbeda59fb04e2b39f_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-operator@sha256:396e8a0e89eb5e2f714594cb1856b4d3e0da9340543d2df0bc781614e93d83bb_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:2e98c45219cf1511fc900d34783ed6059eb516667c03a5f7a922c1c3c2a52138_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:866d9eee7f0cbb32fb195045cb60086b4a66e6bc3212f3df1692cfb27208f991_amd64", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook@sha256:cc5dd5b8b07171678c885a3828b344538fcb1b4f2ba36bfda4d74fa41033f481_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:5b7a05000ecccc64784c4b54457dc34dbcbb73a59201ee0f9f4470f46a8a2a9c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:805960ecffddc4007436d2de56fe8b10c1cc91896702b02a031e11fa0f40450d_s390x", "8Base-RHOSE-4.6:openshift4/ose-sriov-operator-must-gather@sha256:91d3d9efe82d4b95540988656a2dd0e52cce4bf4e16829c6bc3ced02034a6b25_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7a22ffaadeaf537f08d6aded2cd1f0d7542076367e1bd0e88ecd87c31a51470b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f4bd5ef6d43b2c28d678ba8e5b42dfcca3c098a95be95dc30f8217be7b507f15_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:f94f023c41d7798e78d899fa7008fb385b3e77433724c0f8d2a19f1c9e51fe43_amd64", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:10a588249d3c697640fc87278a3add04b8c7d414b1f296ad28a953a033b70fcd_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:7cc38480d17b2c226f33cdfc1d51871249180f29bd6d6a5036c197fd9ed0d993_s390x", "8Base-RHOSE-4.6:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f75e5c5c27fbc8c41706f7f9c25030c1dd970a7a4441e7faeeab01e7f0aaf250_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:1e76b161ee4766eb802a32dfed7a4cf2ef88fb0651cbb1774439d8ff5beb3abf_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:c9f00c6294be703c1fc2f69c3a5bf877fafdd0115f2b1478d684651994c090b4_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:e6b2a3913f4cb7413b1bdadff0912ca9e35ee47ed6da7c07a4bfdde88e3af257_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing" } ] }
rhsa-2020_5635
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.0 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release also includes a security update for Red Hat OpenShift Container Platform 4.7.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.0. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHEA-2020:5633\n\nAll OpenShift Container Platform users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5635", "url": "https://access.redhat.com/errata/RHSA-2020:5635" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1823765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823765" }, { "category": "external", "summary": "1838802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838802" }, { "category": "external", "summary": "1838845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838845" }, { "category": "external", "summary": "1841883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841883" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1868294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868294" }, { "category": "external", "summary": "1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "external", "summary": "1890672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890672" }, { "category": "external", "summary": "1890741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890741" }, { "category": "external", "summary": "1897346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897346" }, { "category": "external", "summary": "1898373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898373" }, { "category": "external", "summary": "1900125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900125" }, { "category": "external", "summary": "1906129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906129" }, { "category": "external", "summary": "1908492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908492" }, { "category": "external", "summary": "1913837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913837" }, { "category": "external", "summary": "1914869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914869" }, { "category": "external", "summary": "1916010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916010" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1923998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923998" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2020_5635.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.0 extras and security update", "tracking": { "current_release_date": "2024-12-17T21:13:21+00:00", "generator": { "date": "2024-12-17T21:13:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2020:5635", "initial_release_date": "2021-02-24T15:00:25+00:00", "revision_history": [ { "date": "2021-02-24T15:00:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-24T15:00:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:13:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "product_id": "openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.7.0-202102111715.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "product": { "name": "openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "product_id": "openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ghostunnel\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "product": { "name": "openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "product_id": "openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-hadoop\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "product": { "name": "openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "product_id": "openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-hive\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "product_id": "openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "product_id": "openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "product_id": "openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "product": { "name": "openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "product_id": "openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "product_id": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-10-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "product": { "name": "openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "product_id": "openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-leader-elector-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "product": { "name": "openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "product_id": "openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "product": { "name": "openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "product_id": "openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-ansible-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "product": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "product_id": "openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-helm-container-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "product": { "name": "openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "product_id": "openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-reporting-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "product": { "name": "openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "product_id": "openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.7.0-202102120026.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "product": { "name": "openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "product_id": "openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "product": { "name": "openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "product_id": "openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-presto\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "product": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "product_id": "openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-operator-must-gather\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "product_id": "openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.7.0-202102110027.p0" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "product": { "name": "openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "product_id": "openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.7.0-202102111715.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "product": { "name": "openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "product_id": "openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "product": { "name": "openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "product_id": "openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "product_id": "openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "product": { "name": "openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "product_id": "openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "product": { "name": "openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "product_id": "openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "product_id": "openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "product": { "name": "openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "product_id": "openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "product": { "name": "openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "product_id": "openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "product_id": "openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "product_id": "openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "product_id": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-10-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "product": { "name": "openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "product_id": "openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-leader-elector-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "product": { "name": "openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "product_id": "openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "product": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "product_id": "openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-metering-helm-container-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "product": { "name": "openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "product_id": "openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.7.0-202102120026.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "product": { "name": "openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "product_id": "openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "product": { "name": "openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "product_id": "openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "product": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "product_id": "openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-operator-must-gather\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "product_id": "openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "product_id": "openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.7.0-202102110027.p0" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "product": { "name": "openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "product_id": "openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.7.0-202102111715.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "product": { "name": "openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "product_id": "openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "product": { "name": "openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "product_id": "openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "product_id": "openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "product": { "name": "openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "product_id": "openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "product": { "name": "openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "product_id": "openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "product_id": "openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "product": { "name": "openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "product_id": "openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "product": { "name": "openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "product_id": "openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "product_id": "openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "product_id": "openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "product_id": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-10-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "product": { "name": "openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "product_id": "openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-leader-elector-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "product": { "name": "openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "product_id": "openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "product": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "product_id": "openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-metering-helm-container-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "product": { "name": "openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "product_id": "openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.7.0-202102120026.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "product": { "name": "openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "product_id": "openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "product": { "name": "openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "product_id": "openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "product": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "product_id": "openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-operator-must-gather\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "product_id": "openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.7.0-202102110027.p0" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "product_id": "openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.7.0-202102110027.p0" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le" }, "product_reference": "openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64" }, "product_reference": "openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x" }, "product_reference": "openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le" }, "product_reference": "openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x" }, "product_reference": "openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le" }, "product_reference": "openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x" }, "product_reference": "openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x" }, "product_reference": "openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le" }, "product_reference": "openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64" }, "product_reference": "openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64" }, "product_reference": "openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x" }, "product_reference": "openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le" }, "product_reference": "openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x" }, "product_reference": "openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64" }, "product_reference": "openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le" }, "product_reference": "openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64" }, "product_reference": "openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64" }, "product_reference": "openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64" }, "product_reference": "openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x" }, "product_reference": "openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le" }, "product_reference": "openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64" }, "product_reference": "openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64" }, "product_reference": "openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64" }, "product_reference": "openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x" }, "product_reference": "openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le" }, "product_reference": "openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le" }, "product_reference": "openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x" }, "product_reference": "openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64" }, "product_reference": "openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le" }, "product_reference": "openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x" }, "product_reference": "openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x" }, "product_reference": "openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le" }, "product_reference": "openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64" }, "product_reference": "openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T15:00:25+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5635" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-24750", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-09-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882310" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24750" }, { "category": "external", "summary": "RHBZ#1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750" } ], "release_date": "2020-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T15:00:25+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5635" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath", "product_ids": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T15:00:25+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5635" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:1e0a2fc1d5bb8926f88a60c56a1ded8c910b39af2e7b29ffff467adce5c866d6_ppc64le", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:43c11bb94d95b58b07fede96fe96d3c292904f85b6f13a684950430f803469d3_amd64", "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator@sha256:89beb57fbc3b672f4700682cac91779f4e91208d7423b3c0c4e013711d41a0bc_s390x", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:2964648ed59e02e5852595c30bcf13dd57c1bbc9b5e443d045cc217ecadb471f_ppc64le", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7d7d7a143af5ab70880d83625e176e5140ff0f57675c2553ba04a9b3b2bfafd8_amd64", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8@sha256:7da622d049e86ce9438a0885ffd6139e4442b5de75227e017c5c343e8bca1759_s390x", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:0f107732d01c659f11c881b3358c972d164b8a00ee8b9d3c51da5f293dc2f89f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:1ddcf832543fc93d2c230eaf8a8de01491d00abfeda8b6671be62dd498445740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator@sha256:4d82ee44b0b8fb72b043aaadd8a3e26c521a05917b2c96df6eea87b29c521b85_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:1120ce10b82eb1818b6c8e21c968fa16ffea8679e2d3336ccf71b8986eb57cfe_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:2457d23d6f280e15db9e95080a321ec371e0376573b40472bbf186b221e5f27c_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity@sha256:86a67c3f4e289074981c2d5801b7476518a11c275c4faf7d3a687668d8846d45_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:534bdca3071ffef9772bfbb4886d46c4c7bcd5239063d5677c84cc80c4a460de_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:6820ccded527954d54e1097b8aa4687cc2c6252fb5d8e85014d4ac215f812103_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:8ef62c75495b3fba9699f281f525dafc98b45cab8b0e9005e1857ce2bedb0e57_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:3eb1a43c7749c7d1b3f263de5b399c3b004d3f7abf61b2db4b42817f67ee7256_amd64", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:52a4b6ccdfcf49083a4e9932006416f6062bdfe973f3847369c0a686b72a78dd_s390x", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator@sha256:61cf64ac93fa816fd847b6b77e1e7af7ef371cd9c22b5120a977774d68a38117_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:43d5a922b10e5046606e446cbd4ab9fd6ec1d392111900f51d5808419378b1a4_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d657a06df47a338ba52eb486a828d98d32fbee12ddd32400fcefff2a78bee457_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:dbebea9c551f515dee77b02ac123d925388d7bb82a8a416f0e479b2d74ad933e_s390x", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:4b0c62dcf30b6eb4dde8dfc64170a12c1b032b98c5a88e73f8ff51aef1abe81c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:8f199f1bdc20bf406cd3feff6e145d68dcb4dfe34fa7869e9d08f2472f850eb1_amd64", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8@sha256:d23a6fbe3bc7527e44456ba9f7ba4366029be4bb600438dd3fc8e73518560679_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:0ab67def3a8f691826813c8ebcc19818ac6c4f7cf3e596361726ffad79ed9865_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:9610ec562e4cb65e71deaf8a3a7b0b04f386db808673deb1fda32a9eb6a1eba0_s390x", "8Base-RHOSE-4.7:openshift4/ose-descheduler@sha256:c1c54cba8509ce0f9a4387875b69d6746af6be0f78692d2a719baf12b581964a_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:37410b1c8557ea9dcaef24359bfb353c501a9fd101fb445bf4b8fe09fc7a0678_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:a148546d4ba80aeacd750d38aefdf45e91ea1a30821605e940e96a90f48c3a58_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy@sha256:f60c6cce350bd3982aec1e36d836d6a6df5262ccedcdefccfabfde412b070dcc_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:5d775e802aa60c92cf5c6c774366effe1a38aae36a7c6c4dbd2cacc614be2234_amd64", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:d5644f7f8eb3b4a91ef0763e51305e562abc06dabb4264d3c319a78f9ce6b93b_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy@sha256:e729e276578049e289e7384724673ece6bb788e24ae6638547037c183f3e9dc8_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:2192a13995bd35a84d46c636e30d18356720d1db3dcd2516b56a6f0833f32744_s390x", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:3d0fdbec0ea4cab82b1176f8f6bfd54d64e36ea9a0ac87e655819f039c8ac45a_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-egress-router@sha256:45fbd21aea572e6946c4aa0efc17f20a824457295968705e1af20d8984332740_amd64", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel@sha256:7f3fa491e4f4a032ad1d09f3e52695add5d045946d38c2bb1fa1f62826f6a0a4_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:16e348a2901903480267445b184fd83e4765815b5fd4f773e3781a153ec8e2a7_amd64", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:45921f0f8801ebc85c50bbcc1e49c7607f04f21f5642049ab23acfbf044e7d90_s390x", "8Base-RHOSE-4.7:openshift4/ose-helm-operator@sha256:4a22762b4f6efd2cc5d31f30fc0915478d154fb4150c22a8c1df6cc16a91bcdc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:48c6b7b54c5e24f3675928d72979011bb7eed7673794efa11a38817d774a10cf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:7ddeac292448fd4c83a0d81b0858f08d674a180581a21803d4e660477e112ca8_s390x", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8@sha256:dd4443504639563afb6b8d722ebb951ada3a7ed35934a30d34a51a1fbb6185dc_amd64", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:04b455582953f4e46d810378a4f6b6b39328ee8858bcef67300d188650f25c19_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:0d3605587c172defc5a41199de0d577a5b5eece84738ec5949b4d2a39017d17a_s390x", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy@sha256:5dd77d0ff74ccc094d9c20396e7515254bc65d6dbc72f349807face686c92cc3_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:085d7cc7da8b074e46d8dd3f88a6611971f39dff5e3e3500160d5cb6ea0b6ad8_amd64", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:268651810366efe50861289c3a02cba5bdad74ac321b331b84b17483569e8fa8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:c0d916b1d54dc440d4e497e9bf28a1d028b11207d4a4bddd1927c0e18a0d8c7e_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:9001a5290c2ddcde246ac2214b81d123673f0e673e03856562ec43b2850728ee_s390x", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:dcf24c8e543c271a2fcd70644dbc05fa3aa614a012ae6112903e136f0bbad6d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8@sha256:e533c2179338aa5676741154f484f2fd60a0a7e93557b1f29ad1deb64be9c9c5_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:48e7f3f4e9b73c7b8ea2eaa539a1efc93fd23c8f34514cc5b11486a8d320cfcb_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:73b942fed2ff91342d054a02396ed11650c738ad5fa8212ac32b812f611117a8_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker@sha256:87105bb09975eb38a220412f9fb15cf332e3d03a35567fac8d9aa70247a4bc83_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:375faea1b0adda5e10ec42d02ecabe5b45323505a0d824341e2e7540590abe5f_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:662c8af03e0f92899ab973792c55943b37bfda93f6d71fb8d326ae0813351ee7_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8@sha256:ac412443ba8ae9dd83a5412b16b98839e88b6436247b34b111043b01d02c22c8_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:6145b9249c38890ea7064cdea0bbcb4549ee13dd98309834c19175d0aa5016c6_amd64", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:c8ad048d3a91ed90cf5cac7d0c63ccb4903bc8df3ee546791c8e1b352de95925_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator@sha256:d108f8affebf09bf8f328e115932813693f4f7ab8d99c3cca0e987e453ac5ccf_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:2ba27a27c78ac54df2dbe4e2c7180c4f34097b414abb78a9597e36439bb1a1e2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:a3e85b3961306c432e24c1c47936d7326c68aa0aa2f702e6d1b981a104547dc7_s390x", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner@sha256:f60b5147fc845b749418d882657b87c03d9fa76c2e1b03bb2c60d60b41a215ce_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator@sha256:30b3705251a6be3b2f48501fdcd4b223d2600b445db00557e086cbc0cc6953e5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop@sha256:46e8fd8a2e6094e3a1130127227f25419fde5afaa877dc3fb943d1ecd7f360b4_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:2d8d9deebbfdcf8268b45806f2aef4a4de570a1fa121788f61211511d8313824_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b2a66b419e4b00cce35631c7053f76de8f49547bac249849e184dc1bda479065_s390x", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8@sha256:b49342fdcea0620131db5d716f486d86596533942399d1a7bf626ce7535bad2c_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-metering-hive@sha256:dc67fad83ef61686a8ded25c4d06f596b6b6e4a9265166158a27ff188d8853d0_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-presto@sha256:563943d287c1d5f57e5b96856444c315213761e1b91b0a1a05b4de37080b22a5_amd64", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator@sha256:fc88ffff0266da27693a52315f520e9d312eb287615227e8732c332ccd51df3d_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:302d82d4c898dfc88f5cfe9b08636331abd7a413a17736aaae7b556c3ed22c27_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:6808fb944e70471dcd85689d10b6ee633cc75daec2ae66f6f5f7c03d4e89c2cb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery@sha256:76c4b71b047368404142f2f68c7c4b84e2b64bd90b98baae8790e48f258f09ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:7c5a0038864a8372c398a2918f292a627dc7e4dd100edf74bfdc0ff8a9f33221_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:80da589d40452a1cf7ac4c7cd475e8f0d6f05ba2b5f04c7b020c4bef54cdee5c_amd64", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8@sha256:d2c2395156e2245cc057304a7cea658ff2e4d50ae68eeb40bdb4637ec1a00890_s390x", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:1fee658e17fda7c434a30ae2c540d98c6725d3aa5b5018ba2c10de3e61de4c77_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:b1cb51a49530ec4f26bcb3494482f7ef6682026cc346edc79a80ed399f3cb63c_amd64", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy@sha256:c95fbdb7c49dceeb6302cb1ba6d8aa22b37ea841b5e9b440e5796736360afab7_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:169b30faee0c683b3d4acf37b52257e761a54181e417d3d4ac9d02c528b18fab_amd64", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:36d90669893a84a5f81f82f2bb9d54789791ccf16ded57f288a8e6fae0397067_s390x", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8@sha256:557f7d3f1e4f124678dc0fdc14bb2c51992fb6c6eacd8ca55e12648bfbbe23fc_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:266e093766da2d39700c3826f35439a2b9c55b431cd0d6d4161a87f5998d3cf3_amd64", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:d81dfc4a897abfd137c53b0a53b5bd12c1d87678531327ee0a8569e4c5853b51_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator@sha256:e64f482beb4b7ec67a6fc8db033bb36cee97b9e96c77725466e4ae8e8c1b7558_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:288d48f61aa0e9d05a17f1343413a7033d952313de74d64331e79c541085a5b2_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94075cd3a6b66139ad4bd23507c0dca78141140be84e4e42ec722c7df17a83b9_s390x", "8Base-RHOSE-4.7:openshift4/ose-ptp@sha256:94ecdf834aa01c267cb598a4756df7a1b93deee4aa54e15cce814b3ecc3c126b_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:22a16cf4f38f298b01b9ffd7b36f0d2caa84b7d2a645ab6adb7adfea03df5bde_s390x", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:396d6ca0399729ee5b9e5d313300ea71fd755db3c7a6aca2ffa231fbeb2f281d_amd64", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8@sha256:51160ab5d6c9ca9be68f6bbf74a9fce123874ca7f24abd4fcf4b0d9b1a73eef3_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:1b7b7c3f2ba55371f37c2e2f19ee6e3cf2132e81d6bbb12b79bfc60e12ca1ad7_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:92bc18711f8e9f610b4cfb5ac60ae2a0a2b10d15cd9ebf26bc2c350db7c0f133_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni@sha256:b3ce4fbe822b6f0b66085de70be2c87dac088dc681987dfe92964dd99a0feeef_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:4304e231216f7bbdb3783a4a07487b0cd5f3ef660beaa8413bab20bd8826e53f_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:94102194df8e67a68d1bee754d900727b3f1a0fc30ca0e3351f6451c9beb49c7_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller@sha256:a447300200bdb9e77166d83b802d1160845bb73bc7ef31d71954c4d4f779ed64_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:65bfef2bf5297147d375ffd54fa9c101fa1bd3a2c256febf3939aae059e41ffe_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:6d1af070fd256903e8bf0f28a5f2d8e6978ba7d63ddef69176f49bdf30b05c6d_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni@sha256:82a376e5cce755d07b65ad3bfa698d85b6af9a427d845e44d488846ed666dcbd_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:78f1f4f82491d43be7497d53258d99f6d6b0759c83b94f16c17ef7db7be4e56e_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:9a2158be8047d6e71055cad948aaa72a0c501221bd81db8bd3c8b8e5e722d7a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon@sha256:b4f71c98716b1276fda72d5e5032db1433b11dbb890dc54a4683364f6eb57b0a_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:5f47c3d87695418f7de8c7c6f53c78466ca5df978485a3655e91da82c4203c40_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:8d069ae28292aaacfc299e3c3ee2ff619781fd213e54dfe9938648d8b9757f89_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin@sha256:eaf0812992c20081823ccc743a37d869fc0bcd2457f2daebdccea568bc1cc3bb_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:7f4c877435f845dd3d33a99bb20109c151314a62efbd5043a198d1643264da9d_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:ba6db3c70a5ba294d8f82fdda8d93fc36a827a96f786ca3131312d52d0d97ca0_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator@sha256:c0ad25032c27e5029f909002fbc9ff491d444ab0d684c25286497ec34b7af4b6_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:47e7d9ebfaa290f275d5958f4f2aacb7d546b096f2c4e9eecc9735c4cf7e6925_amd64", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:9db9f125b9742a7f892d7623bcd3550b3f2a43179176969b5c28432b513371ec_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook@sha256:cc72003d20423e4924a5afb9b34414620c79d325a295b5445429f6dc7d748833_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:075aeadc9d392635929fd10c047c67d7f7e96ece0f342675f2606ca58b21b387_s390x", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:893e4360886c67fce17809b773e21af3bb9d9cdc8843a12e8ae6fe0c1cd2b116_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather@sha256:b956d3e80fe624ad8b579b201df3a8379cb0017ecc9ae3798d962c95251f6851_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42534b4c8fe1c609733b23b2c9da26efd3f9c02476a308e3175d797415df8010_ppc64le", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:958c0418ffe7eaededff6556478db70219f3bdd987714b4620ea9c4c06026ccc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:fc3ec62af896182f973fc62bf8bdc56665e3f223aa43796b06844184a1b645f5_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:243c97545745e7e65991f79ddd4d748ae7ce853cbf13ac72474749f469d705a9_s390x", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:569b6c2f23422db605b2a78e8e8d23a8ddf914ffb61e7c7efa049bb986511edc_amd64", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a7a2440bacd2cdba45e21e8b1b62d849834424b3b34f215c73d03444133ce454_ppc64le", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:cad71e1c88aed5c393c685daa1995d883783c074cf2c693386a9346b3bfafd2b_s390x", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:d449ae86bd77623248579cde456c4a1ce7a0348b20aa52e5da45bd7528e5aa66_amd64", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8@sha256:e9eca6e9143b0f708a9e0cce41a7a586141d3a4e8a06fea1e590e1a50a84cc86_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" } ] }
rhsa-2021_1515
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Openshift Logging Bug Fix Release (5.0.3)\nThis release includes a security update.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Openshift Logging Bug Fix Release (5.0.3)\n\nSecurity Fix(es):\n\n* jackson-databind: arbitrary code execution in slf4j-ext class\n(CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and\nblaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: improper polymorphic deserialization in\naxis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class\n(CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in\njboss-common-core class (CVE-2018-19362)\n\n* jackson-databind: default typing mishandling leading to remote code\nexecution (CVE-2019-14379)\n\n* jackson-databind: Serialization gadgets in\ncom.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-35490)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.SharedPoolDataSource (CVE-2020-35491)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool\n(CVE-2020-35728)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\noadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36179)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36180)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36181)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36182)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-36183)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource\n(CVE-2020-36184)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource\n(CVE-2020-36185)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource\n(CVE-2020-36186)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource\n(CVE-2020-36187)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource\n(CVE-2020-36188)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSourc\ne (CVE-2020-36189)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to javax.swing (CVE-2021-20190)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class\n(CVE-2018-14721)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1515", "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "LOG-1224", "url": "https://issues.redhat.com/browse/LOG-1224" }, { "category": "external", "summary": "LOG-1232", "url": "https://issues.redhat.com/browse/LOG-1232" }, { "category": "external", "summary": "LOG-1234", "url": "https://issues.redhat.com/browse/LOG-1234" }, { "category": "external", "summary": "LOG-1299", "url": "https://issues.redhat.com/browse/LOG-1299" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1515.json" } ], "title": "Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.3)", "tracking": { "current_release_date": "2024-11-24T21:25:33+00:00", "generator": { "date": "2024-11-24T21:25:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1515", "initial_release_date": "2021-05-06T13:38:14+00:00", "revision_history": [ { "date": "2021-05-06T13:38:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-06T13:38:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T21:25:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Logging 5.0", "product": { "name": "OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:logging:5.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "product_id": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "product_id": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "product_id": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "product": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.0.3-6" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "product": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.0.3-6" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "product_id": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "product_id": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "product_id": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "product_id": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "product_id": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "product_id": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64" }, "product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64" }, "product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-24750", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-09-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882310" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24750" }, { "category": "external", "summary": "RHBZ#1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750" } ], "release_date": "2020-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration" }, { "cve": "CVE-2020-35490", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1909266" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35490" }, { "category": "external", "summary": "RHBZ#1909266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909266" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35490", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35490" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2986", "url": "https://github.com/FasterXML/jackson-databind/issues/2986" } ], "release_date": "2020-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-35491", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1909269" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35491" }, { "category": "external", "summary": "RHBZ#1909269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909269" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35491", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2986", "url": "https://github.com/FasterXML/jackson-databind/issues/2986" } ], "release_date": "2020-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-35728", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-27T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1911502" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat Products ship jackson-databind version 2.10.0 or later which is not considered affected by this CVE (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba) \n* JBoss Data Grid 7\n* JBoss Data Grid 8\n* Enterprise Application Platform 7\n* Red Hat Decision Manager 7\n* Red Hat Process Automation Manager 7\n* Red Hat Single Sign-On (RH-SSO) 7\n* Red Hat JBoss Fuse 7\n* Red Hat JBoss A-MQ\n* Red Hat Enterprise Linux 8\n* Red Hat Satellite 6.6\n* Red Hat Satellite 6.7\n* Red Hat Satellite 6.8\n* Red Hat CodeReady Studio 12\n\nRed Hat OpenShift Container Platform and Red Hat OpenStack Platform does ship the vulnerable components, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nRed Hat OpenStack Platform 13 ships OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35728" }, { "category": "external", "summary": "RHBZ#1911502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35728", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35728" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2999", "url": "https://github.com/FasterXML/jackson-databind/issues/2999" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-36179", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913871" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36179" }, { "category": "external", "summary": "RHBZ#1913871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36179", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36179" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36180", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913872" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36180" }, { "category": "external", "summary": "RHBZ#1913872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36180", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36181", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913874" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36181" }, { "category": "external", "summary": "RHBZ#1913874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36181", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36182", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913926" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36182" }, { "category": "external", "summary": "RHBZ#1913926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913926" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36182", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36183", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913927" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36183" }, { "category": "external", "summary": "RHBZ#1913927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36183", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3003", "url": "https://github.com/FasterXML/jackson-databind/issues/3003" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-36184", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913928" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36184" }, { "category": "external", "summary": "RHBZ#1913928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913928" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36184", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2998", "url": "https://github.com/FasterXML/jackson-databind/issues/2998" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-36185", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913929" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36185" }, { "category": "external", "summary": "RHBZ#1913929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36185", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2998", "url": "https://github.com/FasterXML/jackson-databind/issues/2998" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-36186", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913931" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36186" }, { "category": "external", "summary": "RHBZ#1913931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36186", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2997", "url": "https://github.com/FasterXML/jackson-databind/issues/2997" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-36187", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913933" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36187" }, { "category": "external", "summary": "RHBZ#1913933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36187", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2997", "url": "https://github.com/FasterXML/jackson-databind/issues/2997" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-36188", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913934" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but they do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36188" }, { "category": "external", "summary": "RHBZ#1913934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36188", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2996", "url": "https://github.com/FasterXML/jackson-databind/issues/2996" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource" }, { "cve": "CVE-2020-36189", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913937" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36189" }, { "category": "external", "summary": "RHBZ#1913937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36189", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2996", "url": "https://github.com/FasterXML/jackson-databind/issues/2996" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource" }, { "cve": "CVE-2021-20190", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1916633" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* CodeReady WorkSpaces Server Container\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20190" }, { "category": "external", "summary": "RHBZ#1916633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-5949-rw7g-wx7w", "url": "https://github.com/advisories/GHSA-5949-rw7g-wx7w" } ], "release_date": "2021-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid javax.swing in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
var-202009-1633
Vulnerability from variot
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. FasterXML jackson-databind There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. FasterXML jackson-databind is a library based on JAVA that can convert data formats such as XML and JSON to JAVA objects. Jackson can easily convert Java objects into json objects and xml documents, as well as convert json and xml into Java objects. FasterXML jackson-databind 2.0 series prior to 2.9.10.6 has a security vulnerability, which originates from com.pastdev.httpcomponents.configuration.JndiConfiguration. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: rh-maven35-jackson-databind security update Advisory ID: RHSA-2020:4173-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2020:4173 Issue date: 2020-10-05 CVE Names: CVE-2020-24750 ==================================================================== 1. Summary:
An update for rh-maven35-jackson-databind is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch
- Description:
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.
Security Fix(es):
- jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
- Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source: rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm
noarch: rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source: rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm
noarch: rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):
Source: rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm
noarch: rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source: rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm
noarch: rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm
noarch: rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-24750 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX3s4DtzjgjWX9erEAQhtzQ/+KJm3W2dfbUqCVcdtymA4f4UfDt0LFXTP T5AuDJQk5evqIQWpnV/bgbpnIhkGLFVW6AWAQK0pnT5Zl4HK33+sNOTRHKpey0PR j3C43AuFL68XeWVKX8iJdAo42s/a3K4QjEgofXiXfDipPxg356zb8lm4RiXlx9db LMgXAL0uKDzv+4HYcEmOY7A+8rDB4GwLLDmj2J6ZyahNLOECJbO7CdPVEUeT/cFN 32vYBoxmLw1CahI5RcpiebibLA2SRss84iG+/NceptBTfqQzcHVipBHzryOUNsVz PHCcgDAi0KiNR8ugj142CBcVmW6nu3WCipqxjQ86cRx3r2yu5B3yTlAMxjaBxHIC usxO7BPuiK+6Cizw0Qd/DaI0e2YkEvGJ6OwDxEB27j3id9IB9Q1n6qucZH8vahAi gJv/W+Ij1Ff1OaNVZIfXLFAnloVZAy6jBXvwzZNJWOkbHPRjbcz8JJWOt5v4AbsR DKKLs+EoxE+3GPJdTL1EAgA+rrEmbtXVHyuqamf89H5LD2yGjJF8IJkk1ei9b3FJ /hj8UXrfKYnfSM0Q/UnqQbTWXYjqhjJpkrTXTIFR2zZxnaYNOaH/lmMfBpvBEYBW K0I0Y47LoZnt2P+kaJnHWu+uuuETIkrThNZK+JH1qFzhjYfc2AGcB9r2SMAWEARI LOeqeMsgpVs=jbsa -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Bugs fixed (https://bugzilla.redhat.com/):
1666415 - CVE-2018-14718 jackson-databind: arbitrary code execution in slf4j-ext class 1666418 - CVE-2018-14719 jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes 1666423 - CVE-2018-14720 jackson-databind: exfiltration/XXE in some JDK classes 1666428 - CVE-2018-14721 jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class 1666482 - CVE-2018-19360 jackson-databind: improper polymorphic deserialization in axis2-transport-jms class 1666484 - CVE-2018-19361 jackson-databind: improper polymorphic deserialization in openjpa class 1666489 - CVE-2018-19362 jackson-databind: improper polymorphic deserialization in jboss-common-core class 1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution 1859004 - Sometimes the eventrouter couldn't gather event logs.
Bug Fix(es):
-
Gather image registry config (backport to 4.3) (BZ#1836815)
-
Builds fail after running postCommit script if OCP cluster is configured with a container registry whitelist (BZ#1849176)
-
Login with OpenShift not working after cluster upgrade (BZ#1852429)
-
Limit the size of gathered federated metrics from alerts in Insights Operator (BZ#1874018)
-
[4.3] Storage operator stops reconciling when going Upgradeable=False on v1alpha1 CRDs (BZ#1879110)
-
[release 4.3] OpenShift APIs become unavailable for more than 15 minutes after one of master nodes went down(OAuth) (BZ#1880293)
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.40-x86_64
The image digest is sha256:9ff90174a170379e90a9ead6e0d8cf6f439004191f80762764a5ca3dbaab01dc
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.40-s390x The image digest is sha256:605ddde0442e604cfe2d6bd1541ce48df5956fe626edf9cc95b1fca75d231b64
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.40-ppc64le
The image digest is sha256:d3c9e391c145338eae3feb7f6a4e487dadc8139a353117d642fe686d277bcccc
- Bugs fixed (https://bugzilla.redhat.com/):
1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic 1836815 - Gather image registry config (backport to 4.3) 1849176 - Builds fail after running postCommit script if OCP cluster is configured with a container registry whitelist 1874018 - Limit the size of gathered federated metrics from alerts in Insights Operator 1874399 - [DR] etcd-member-recover.sh fails to pull image with unauthorized 1879110 - [4.3] Storage operator stops reconciling when going Upgradeable=False on v1alpha1 CRDs
- JIRA issues fixed (https://issues.jboss.org/):
LOG-1224 - Release 5.0 - ClusterLogForwarder namespace-specific log forwarding does not work as expected LOG-1232 - 5.0 - Bug 1859004 - Sometimes the eventrouter couldn't gather event logs. LOG-1234 - CVE-2020-15586 CVE-2020-16845 openshift-eventrouter: various flaws [openshift-4] LOG-1299 - Release 5.0 Forwarding logs to Kafka using Chained certificates fails with error "state=error: certificate verify failed (unable to get local issuer certificate)"
- Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHEA-2020:5633
All OpenShift Container Platform users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor. Solution:
For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/):
1823765 - nfd-workers crash under an ipv6 environment 1838802 - mysql8 connector from operatorhub does not work with metering operator 1838845 - Metering operator can't connect to postgres DB from Operator Hub 1841883 - namespace-persistentvolumeclaim-usage query returns unexpected values 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1868294 - NFD operator does not allow customisation of nfd-worker.conf 1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration 1890672 - NFD is missing a build flag to build correctly 1890741 - path to the CA trust bundle ConfigMap is broken in report operator 1897346 - NFD worker pods not scheduler on a 3 node master/worker cluster 1898373 - Metering operator failing upgrade from 4.4 to 4.6 channel 1900125 - FIPS error while generating RSA private key for CA 1906129 - OCP 4.7: Node Feature Discovery (NFD) Operator in CrashLoopBackOff when deployed from OperatorHub 1908492 - OCP 4.7: Node Feature Discovery (NFD) Operator Custom Resource Definition file in olm-catalog is not in sync with the one in manifests dir leading to failed deployment from OperatorHub 1913837 - The CI and ART 4.7 metering images are not mirrored 1914869 - OCP 4.7 NFD - Operand configuration options for NodeFeatureDiscovery are empty, no supported image for ppc64le 1916010 - olm skip range is set to the wrong range 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923998 - NFD Operator is failing to update and remains in Replacing state
5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-1633", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ucosminexus application server", "scope": null, "trust": 1.6, "vendor": "\u65e5\u7acb", "version": null }, { "model": "ucosminexus service platform", "scope": null, "trust": 1.6, "vendor": "\u65e5\u7acb", "version": null }, { "model": "siebel ui framework", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "21.2" }, { "model": "communications session report manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.2.1" }, { "model": "communications session report manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.0.0" }, { "model": "communications contacts server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0" }, { "model": "jackson-databind", "scope": "gte", "trust": 1.0, "vendor": "fasterxml", "version": "2.7.0" }, { "model": "communications diameter signaling router", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.2" }, { "model": "communications diameter signaling router", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.0" }, { "model": "communications policy management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.5.0" }, { "model": "communications session route manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.2.1" }, { "model": "jackson-databind", "scope": "lt", "trust": 1.0, "vendor": "fasterxml", "version": "2.9.10.6" }, { "model": "communications pricing design center", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.0.0.4.0" }, { "model": "banking liquidity management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.3" }, { "model": "jackson-databind", "scope": "lt", "trust": 1.0, "vendor": "fasterxml", "version": "2.6.7.5" }, { "model": "communications instant messaging server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "10.0.1.5.0" }, { "model": "banking supply chain finance", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.3.0" }, { "model": "banking liquidity management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.2" }, { "model": "siebel core - server framework", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "21.5" }, { "model": "banking corporate lending process management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.3.0" }, { "model": "banking supply chain finance", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.5.0" }, { "model": "communications offline mediation controller", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.0.0.3.0" }, { "model": "communications calendar server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0.0.4.0" }, { "model": "communications element manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.4.0" }, { "model": "communications calendar server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0" }, { "model": "banking corporate lending process management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.5.0" }, { "model": "communications unified inventory management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "7.4.1" }, { "model": "banking credit facilities process management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.3.0" }, { "model": "agile plm", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "9.3.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "banking supply chain finance", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.2.0" }, { "model": "autovue for agile product lifecycle management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "21.0.2" }, { "model": "jackson-databind", "scope": "gte", "trust": 1.0, "vendor": "fasterxml", "version": "2.0.0" }, { "model": "banking credit facilities process management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.5.0" }, { "model": "banking corporate lending process management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.2.0" }, { "model": "identity manager connector", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.1.1.5.0" }, { "model": "communications contacts server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0.0.5.0" }, { "model": "communications element manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.2.0" }, { "model": "banking credit facilities process management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.2.0" }, { "model": "application testing suite", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "13.3.0.1" }, { "model": "banking liquidity management", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "14.5" }, { "model": "blockchain platform", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "21.1.2" }, { "model": "communications messaging server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.1" }, { "model": "communications session route manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.2.0" }, { "model": "communications services gatekeeper", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "7.0" }, { "model": "jackson-databind", "scope": null, "trust": 0.8, "vendor": "fasterxml", "version": null }, { "model": "ucosminexus application server-r", "scope": null, "trust": 0.8, "vendor": "\u65e5\u7acb", "version": null }, { "model": "ucosminexus developer", "scope": null, "trust": 0.8, "vendor": "\u65e5\u7acb", "version": null }, { "model": "ucosminexus service architect", "scope": null, "trust": 0.8, "vendor": "\u65e5\u7acb", "version": null }, { "model": "agile product lifecycle management", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e9\u30af\u30eb", "version": null }, { "model": "oracle communications calendar server", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e9\u30af\u30eb", "version": null }, { "model": "oracle communications contacts server", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e9\u30af\u30eb", "version": null }, { "model": "oracle communications diameter signaling router", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e9\u30af\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "NVD", "id": "CVE-2020-24750" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.9.10.6", "versionStartIncluding": "2.9.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.4.0", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2.1", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "21.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "21.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.1.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2.1", "versionStartIncluding": "8.0.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-24750" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "159466" }, { "db": "PACKETSTORM", "id": "162350" }, { "db": "PACKETSTORM", "id": "159661" }, { "db": "PACKETSTORM", "id": "162493" }, { "db": "PACKETSTORM", "id": "161536" }, { "db": "CNNVD", "id": "CNNVD-202009-1066" } ], "trust": 1.1 }, "cve": "CVE-2020-24750", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-24750", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-178660", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-24750", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-24750", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202009-1066", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-178660", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-24750", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-178660" }, { "db": "VULMON", "id": "CVE-2020-24750" }, { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202009-1066" }, { "db": "NVD", "id": "CVE-2020-24750" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. FasterXML jackson-databind There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. FasterXML jackson-databind is a library based on JAVA that can convert data formats such as XML and JSON to JAVA objects. Jackson can easily convert Java objects into json objects and xml documents, as well as convert json and xml into Java objects. FasterXML jackson-databind 2.0 series prior to 2.9.10.6 has a security vulnerability, which originates from com.pastdev.httpcomponents.configuration.JndiConfiguration. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: rh-maven35-jackson-databind security update\nAdvisory ID: RHSA-2020:4173-01\nProduct: Red Hat Software Collections\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:4173\nIssue date: 2020-10-05\nCVE Names: CVE-2020-24750\n====================================================================\n1. Summary:\n\nAn update for rh-maven35-jackson-databind is now available for Red Hat\nSoftware Collections. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - noarch\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch\n\n3. Description:\n\nThe jackson-databind package provides general data-binding functionality\nfor Jackson, which works on top of Jackson core streaming API. \n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in\ncom.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration\n\n6. Package List:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm\n\nnoarch:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm\nrh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm\n\nnoarch:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm\nrh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):\n\nSource:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm\n\nnoarch:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm\nrh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):\n\nSource:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm\n\nnoarch:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm\nrh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm\n\nnoarch:\nrh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm\nrh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-24750\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBX3s4DtzjgjWX9erEAQhtzQ/+KJm3W2dfbUqCVcdtymA4f4UfDt0LFXTP\nT5AuDJQk5evqIQWpnV/bgbpnIhkGLFVW6AWAQK0pnT5Zl4HK33+sNOTRHKpey0PR\nj3C43AuFL68XeWVKX8iJdAo42s/a3K4QjEgofXiXfDipPxg356zb8lm4RiXlx9db\nLMgXAL0uKDzv+4HYcEmOY7A+8rDB4GwLLDmj2J6ZyahNLOECJbO7CdPVEUeT/cFN\n32vYBoxmLw1CahI5RcpiebibLA2SRss84iG+/NceptBTfqQzcHVipBHzryOUNsVz\nPHCcgDAi0KiNR8ugj142CBcVmW6nu3WCipqxjQ86cRx3r2yu5B3yTlAMxjaBxHIC\nusxO7BPuiK+6Cizw0Qd/DaI0e2YkEvGJ6OwDxEB27j3id9IB9Q1n6qucZH8vahAi\ngJv/W+Ij1Ff1OaNVZIfXLFAnloVZAy6jBXvwzZNJWOkbHPRjbcz8JJWOt5v4AbsR\nDKKLs+EoxE+3GPJdTL1EAgA+rrEmbtXVHyuqamf89H5LD2yGjJF8IJkk1ei9b3FJ\n/hj8UXrfKYnfSM0Q/UnqQbTWXYjqhjJpkrTXTIFR2zZxnaYNOaH/lmMfBpvBEYBW\nK0I0Y47LoZnt2P+kaJnHWu+uuuETIkrThNZK+JH1qFzhjYfc2AGcB9r2SMAWEARI\nLOeqeMsgpVs=jbsa\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Bugs fixed (https://bugzilla.redhat.com/):\n\n1666415 - CVE-2018-14718 jackson-databind: arbitrary code execution in slf4j-ext class\n1666418 - CVE-2018-14719 jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes\n1666423 - CVE-2018-14720 jackson-databind: exfiltration/XXE in some JDK classes\n1666428 - CVE-2018-14721 jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class\n1666482 - CVE-2018-19360 jackson-databind: improper polymorphic deserialization in axis2-transport-jms class\n1666484 - CVE-2018-19361 jackson-databind: improper polymorphic deserialization in openjpa class\n1666489 - CVE-2018-19362 jackson-databind: improper polymorphic deserialization in jboss-common-core class\n1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution\n1859004 - Sometimes the eventrouter couldn\u0027t gather event logs. \n\nBug Fix(es):\n\n* Gather image registry config (backport to 4.3) (BZ#1836815)\n\n* Builds fail after running postCommit script if OCP cluster is configured\nwith a container registry whitelist (BZ#1849176)\n\n* Login with OpenShift not working after cluster upgrade (BZ#1852429)\n\n* Limit the size of gathered federated metrics from alerts in Insights\nOperator (BZ#1874018)\n\n* [4.3] Storage operator stops reconciling when going Upgradeable=False on\nv1alpha1 CRDs (BZ#1879110)\n\n* [release 4.3] OpenShift APIs become unavailable for more than 15 minutes\nafter one of master nodes went down(OAuth) (BZ#1880293)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.3.40-x86_64\n\nThe image digest is\nsha256:9ff90174a170379e90a9ead6e0d8cf6f439004191f80762764a5ca3dbaab01dc\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.3.40-s390x\nThe image digest is\nsha256:605ddde0442e604cfe2d6bd1541ce48df5956fe626edf9cc95b1fca75d231b64\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.3.40-ppc64le\n\nThe image digest is\nsha256:d3c9e391c145338eae3feb7f6a4e487dadc8139a353117d642fe686d277bcccc\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic\n1836815 - Gather image registry config (backport to 4.3)\n1849176 - Builds fail after running postCommit script if OCP cluster is configured with a container registry whitelist\n1874018 - Limit the size of gathered federated metrics from alerts in Insights Operator\n1874399 - [DR] etcd-member-recover.sh fails to pull image with unauthorized\n1879110 - [4.3] Storage operator stops reconciling when going Upgradeable=False on v1alpha1 CRDs\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1224 - Release 5.0 - ClusterLogForwarder namespace-specific log forwarding does not work as expected\nLOG-1232 - 5.0 - Bug 1859004 - Sometimes the eventrouter couldn\u0027t gather event logs. \nLOG-1234 - CVE-2020-15586 CVE-2020-16845 openshift-eventrouter: various flaws [openshift-4]\nLOG-1299 - Release 5.0 Forwarding logs to Kafka using Chained certificates fails with error \"state=error: certificate verify failed (unable to get local issuer certificate)\"\n\n5. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHEA-2020:5633\n\nAll OpenShift Container Platform users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor. Solution:\n\nFor OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html. Bugs fixed (https://bugzilla.redhat.com/):\n\n1823765 - nfd-workers crash under an ipv6 environment\n1838802 - mysql8 connector from operatorhub does not work with metering operator\n1838845 - Metering operator can\u0027t connect to postgres DB from Operator Hub\n1841883 - namespace-persistentvolumeclaim-usage query returns unexpected values\n1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash\n1868294 - NFD operator does not allow customisation of nfd-worker.conf\n1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration\n1890672 - NFD is missing a build flag to build correctly\n1890741 - path to the CA trust bundle ConfigMap is broken in report operator\n1897346 - NFD worker pods not scheduler on a 3 node master/worker cluster\n1898373 - Metering operator failing upgrade from 4.4 to 4.6 channel\n1900125 - FIPS error while generating RSA private key for CA\n1906129 - OCP 4.7: Node Feature Discovery (NFD) Operator in CrashLoopBackOff when deployed from OperatorHub\n1908492 - OCP 4.7: Node Feature Discovery (NFD) Operator Custom Resource Definition file in olm-catalog is not in sync with the one in manifests dir leading to failed deployment from OperatorHub\n1913837 - The CI and ART 4.7 metering images are not mirrored\n1914869 - OCP 4.7 NFD - Operand configuration options for NodeFeatureDiscovery are empty, no supported image for ppc64le\n1916010 - olm skip range is set to the wrong range\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1923998 - NFD Operator is failing to update and remains in Replacing state\n\n5", "sources": [ { "db": "NVD", "id": "CVE-2020-24750" }, { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-178660" }, { "db": "VULMON", "id": "CVE-2020-24750" }, { "db": "PACKETSTORM", "id": "159466" }, { "db": "PACKETSTORM", "id": "162350" }, { "db": "PACKETSTORM", "id": "159661" }, { "db": "PACKETSTORM", "id": "162493" }, { "db": "PACKETSTORM", "id": "161536" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-24750", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "162493", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "159466", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "162350", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-011430", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3631", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0691", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3449", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1397", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1437", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0616", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1573", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022060909", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021072820", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021042534", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021050708", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022041931", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022012315", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021072725", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021042826", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021042318", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022021426", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-1066", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-178660", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-24750", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "159661", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161536", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178660" }, { "db": "VULMON", "id": "CVE-2020-24750" }, { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "PACKETSTORM", "id": "159466" }, { "db": "PACKETSTORM", "id": "162350" }, { "db": "PACKETSTORM", "id": "159661" }, { "db": "PACKETSTORM", "id": "162493" }, { "db": "PACKETSTORM", "id": "161536" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202009-1066" }, { "db": "NVD", "id": "CVE-2020-24750" } ] }, "id": "VAR-202009-1633", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-178660" } ], "trust": 0.01 }, "last_update_date": "2024-02-19T22:54:37.042000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "hitachi-sec-2021-109", "trust": 0.8, "url": "https://github.com/fasterxml/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "title": "FasterXML jackson-databind Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=129712" }, { "title": "Red Hat: Important: rh-maven35-jackson-databind security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20204173 - security advisory" }, { "title": "Red Hat: Low: OpenShift Container Platform 4.3.40 security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20204264 - security advisory" }, { "title": "Hitachi Security Advisories: Multiple Vulnerabilities in Cosminexus", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories\u0026qid=hitachi-sec-2021-109" }, { "title": "CVE-2020-24750", "trust": 0.1, "url": "https://github.com/al1ex/cve-2020-24750 " }, { "title": "", "trust": 0.1, "url": "https://github.com/pctf/vulnerable-app " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-24750" }, { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "CNNVD", "id": "CNNVD-202009-1066" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178660" }, { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "NVD", "id": "CVE-2020-24750" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.oracle.com/security-alerts/cpuapr2021.html" }, { "trust": 2.3, "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "trust": 2.3, "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "trust": 1.7, "url": "https://github.com/fasterxml/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20201009-0003/" }, { "trust": 1.7, "url": "https://github.com/fasterxml/jackson-databind/issues/2798" }, { "trust": 1.7, "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "trust": 1.7, "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "trust": 1.7, "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "trust": 1.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24750" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-identified-in-jackson-databind-shipped-with-ibm-cloud-pak-system-cve-2020-24750/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022060909" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159466/red-hat-security-advisory-2020-4173-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021072820" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022021426" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022041931" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021042826" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cognos-business-intelligence-has-addressed-multiple-vulnerabilities-q12021/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022012315" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021042318" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-fasterxml-jackson-databind-8/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021042534" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1397" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1573" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6525182" }, { "trust": 0.6, "url": "https://www.oracle.com/security-alerts/cpujul2021.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0616" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021050708" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162493/red-hat-security-advisory-2021-1515-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3449/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1437" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6528214" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0691" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-jquery-spring-dom4j-mongodb-linux-kernel-targetcli-fb-jackson-node-js-and-apache-commons-affect-ibm-spectrum-protect-plus/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021072725" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3631/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162350/red-hat-security-advisory-2021-1230-01.html" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-24750" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.3, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36189" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-19360" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36188" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14379" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14720" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-14718" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20190" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14718" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36179" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19361" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36185" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35490" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-14719" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14719" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36180" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-14720" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35491" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35490" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35728" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36180" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36181" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35491" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36182" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36183" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36186" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19360" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36187" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-19362" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36183" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19362" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36188" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-14721" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36179" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36182" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36185" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14721" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36186" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36187" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36189" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36184" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36181" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36184" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20190" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-19361" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35728" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-14379" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-20388" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-7595" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19956" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-16935" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-19956" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-17546" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-15903" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16935" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-8492" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-20843" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20843" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17546" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20388" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15903" }, { "trust": 0.2, "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4173" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3449" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3449" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.6/updating/updating-cluster" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:1230" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhba-2021:1232" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4264" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17006" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12749" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-2974" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-19126" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14866" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17023" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17023" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-6829" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12652" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12403" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11756" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-11756" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12243" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11068" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18197" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5482" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14973" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17498" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-18197" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12749" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17006" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2226" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2780" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5094" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12450" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2974" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2752" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20386" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-rel" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2574" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14352" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14822" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14822" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12400" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-11727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11719" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2225" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5482" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12825" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18190" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14973" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12402" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8696" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2181" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5188" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-12652" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12401" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12450" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2182" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-11719" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.3/updating/updating-cluster" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8675" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14866" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20386" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-18190" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2224" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5094" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11727" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5188" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19126" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-11068" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17498" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2812" }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-2163" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-15586" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16845" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-16845" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15586" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:1515" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhea-2020:5633" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20907" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8624" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-13050" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17450" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9925" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9802" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20218" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9895" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8625" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-13225" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-15165" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14382" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8812" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3899" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8819" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3867" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1971" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20454" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8720" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9893" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-19221" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8808" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3902" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8623" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20907" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1751" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3900" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8566" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8743" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25211" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19906" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8820" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9807" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8769" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8710" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8813" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9850" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8710" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8811" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:5635" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5018" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16168" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9803" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9862" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-24659" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9327" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3885" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17450" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-15503" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20807" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20916" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5018" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10018" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14889" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-15157" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8835" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25658" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8764" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8844" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3865" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1730" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3864" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-19906" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20387" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20387" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13627" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14391" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-15999" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3862" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3901" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20916" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3884" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3884" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8823" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1752" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8622" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13225" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19221" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3895" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15165" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11793" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20454" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8720" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9894" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8816" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9843" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-13627" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-6405" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8771" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13050" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3897" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9806" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8814" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14889" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8743" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3121" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9915" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16168" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8815" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-13632" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20218" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8625" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10029" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8783" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20807" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-13630" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14040" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8619" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-13631" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8766" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3868" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8846" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3894" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-8782" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-3898" } ], "sources": [ { "db": "VULHUB", "id": "VHN-178660" }, { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "PACKETSTORM", "id": "159466" }, { "db": "PACKETSTORM", "id": "162350" }, { "db": "PACKETSTORM", "id": "159661" }, { "db": "PACKETSTORM", "id": "162493" }, { "db": "PACKETSTORM", "id": "161536" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202009-1066" }, { "db": "NVD", "id": "CVE-2020-24750" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-178660" }, { "db": "VULMON", "id": "CVE-2020-24750" }, { "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "db": "PACKETSTORM", "id": "159466" }, { "db": "PACKETSTORM", "id": "162350" }, { "db": "PACKETSTORM", "id": "159661" }, { "db": "PACKETSTORM", "id": "162493" }, { "db": "PACKETSTORM", "id": "161536" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202009-1066" }, { "db": "NVD", "id": "CVE-2020-24750" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-17T00:00:00", "db": "VULHUB", "id": "VHN-178660" }, { "date": "2020-09-17T00:00:00", "db": "VULMON", "id": "CVE-2020-24750" }, { "date": "2021-04-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "date": "2020-10-05T17:20:49", "db": "PACKETSTORM", "id": "159466" }, { "date": "2021-04-27T15:37:46", "db": "PACKETSTORM", "id": "162350" }, { "date": "2020-10-21T15:40:32", "db": "PACKETSTORM", "id": "159661" }, { "date": "2021-05-06T15:03:00", "db": "PACKETSTORM", "id": "162493" }, { "date": "2021-02-25T15:26:54", "db": "PACKETSTORM", "id": "161536" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2020-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1066" }, { "date": "2020-09-17T19:15:13.580000", "db": "NVD", "id": "CVE-2020-24750" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-12T00:00:00", "db": "VULHUB", "id": "VHN-178660" }, { "date": "2023-09-13T00:00:00", "db": "VULMON", "id": "CVE-2020-24750" }, { "date": "2021-04-02T05:20:00", "db": "JVNDB", "id": "JVNDB-2020-011430" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2022-06-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1066" }, { "date": "2023-09-13T14:56:17.593000", "db": "NVD", "id": "CVE-2020-24750" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1066" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FasterXML\u00a0jackson-databind\u00a0 Untrusted Data Deserialization Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011430" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
ghsa-qjw2-hr98-qgfh
Vulnerability from github
FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 2.6.7.4" }, "package": { "ecosystem": "Maven", "name": "com.fasterxml.jackson.core:jackson-databind" }, "ranges": [ { "events": [ { "introduced": "2.0" }, { "fixed": "2.6.7.5" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 2.9.10.5" }, "package": { "ecosystem": "Maven", "name": "com.fasterxml.jackson.core:jackson-databind" }, "ranges": [ { "events": [ { "introduced": "2.7.0" }, { "fixed": "2.9.10.6" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-24750" ], "database_specific": { "cwe_ids": [ "CWE-502" ], "github_reviewed": true, "github_reviewed_at": "2021-03-18T23:41:09Z", "nvd_published_at": "2020-09-17T19:15:00Z", "severity": "HIGH" }, "details": "FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.", "id": "GHSA-qjw2-hr98-qgfh", "modified": "2022-04-08T22:16:20Z", "published": "2021-12-09T19:15:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750" }, { "type": "WEB", "url": "https://github.com/FasterXML/jackson-databind/issues/2798" }, { "type": "WEB", "url": "https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb" }, { "type": "WEB", "url": "https://github.com/FasterXML/jackson-databind/commit/6cc9f1a1af323cd156f5668a47e43bab324ae16f" }, { "type": "WEB", "url": "https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b" }, { "type": "PACKAGE", "url": "https://github.com/FasterXML/jackson-databind" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20201009-0003" }, { "type": "WEB", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Unsafe Deserialization in jackson-databind" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.