Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-8565
Vulnerability from cvelistv5
Published
2020-12-07 22:00
Modified
2024-09-17 00:05
Severity ?
EPSS score ?
Summary
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.
References
▼ | URL | Tags | |
---|---|---|---|
jordan@liggitt.net | https://github.com/kubernetes/kubernetes/issues/95623 | Third Party Advisory | |
jordan@liggitt.net | https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/kubernetes/kubernetes/issues/95623 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ | Mailing List, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Kubernetes | Kubernetes |
Version: <= 1.19.3 Version: <= 1.18.10 Version: <= 1.17.13 Version: < 1.20.0-alpha2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Multiple secret leaks when verbose logging is enabled", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kubernetes/kubernetes/issues/95623" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Kubernetes", "vendor": "Kubernetes", "versions": [ { "status": "affected", "version": "\u003c= 1.19.3" }, { "status": "affected", "version": "\u003c= 1.18.10" }, { "status": "affected", "version": "\u003c= 1.17.13" }, { "status": "affected", "version": "\u003c 1.20.0-alpha2" } ] } ], "credits": [ { "lang": "en", "value": "Patrick Rhomberg (purelyapplied)" } ], "datePublic": "2020-10-15T00:00:00", "descriptions": [ { "lang": "en", "value": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Information Exposure Through Log Files", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-07T22:00:19", "orgId": "a6081bf6-c852-4425-ad4f-a67919267565", "shortName": "kubernetes" }, "references": [ { "name": "Multiple secret leaks when verbose logging is enabled", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kubernetes/kubernetes/issues/95623" } ], "source": { "defect": [ "https://github.com/kubernetes/kubernetes/issues/95623" ], "discovery": "EXTERNAL" }, "title": "Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "workarounds": [ { "lang": "en", "value": "Do not enable verbose logging in production (log level \u003e= 9), limit access to logs." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@kubernetes.io", "DATE_PUBLIC": "2020-10-15T04:00:00.000Z", "ID": "CVE-2020-8565", "STATE": "PUBLIC", "TITLE": "Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kubernetes", "version": { "version_data": [ { "version_value": "\u003c= 1.19.3" }, { "version_value": "\u003c= 1.18.10" }, { "version_value": "\u003c= 1.17.13" }, { "version_value": "\u003c 1.20.0-alpha2" } ] } } ] }, "vendor_name": "Kubernetes" } ] } }, "credit": [ { "lang": "eng", "value": "Patrick Rhomberg (purelyapplied)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532 Information Exposure Through Log Files" } ] } ] }, "references": { "reference_data": [ { "name": "Multiple secret leaks when verbose logging is enabled", "refsource": "MLIST", "url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ" }, { "name": "https://github.com/kubernetes/kubernetes/issues/95623", "refsource": "CONFIRM", "url": "https://github.com/kubernetes/kubernetes/issues/95623" } ] }, "source": { "defect": [ "https://github.com/kubernetes/kubernetes/issues/95623" ], "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "Do not enable verbose logging in production (log level \u003e= 9), limit access to logs." } ] } } }, "cveMetadata": { "assignerOrgId": "a6081bf6-c852-4425-ad4f-a67919267565", "assignerShortName": "kubernetes", "cveId": "CVE-2020-8565", "datePublished": "2020-12-07T22:00:19.374983Z", "dateReserved": "2020-02-03T00:00:00", "dateUpdated": "2024-09-17T00:05:58.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-8565\",\"sourceIdentifier\":\"jordan@liggitt.net\",\"published\":\"2020-12-07T22:15:21.400\",\"lastModified\":\"2024-11-21T05:39:02.543\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2.\"},{\"lang\":\"es\",\"value\":\"En Kubernetes, si el nivel de registro se establece en al menos 9, los tokens de autorizaci\u00f3n y portador se escribir\u00e1n en los archivos de registro. Esto puede ocurrir tanto en los registros del servidor API como en la salida de la herramienta cliente como kubectl. Esto afecta a versiones anteriores e iguales a v1.19.3, versiones anteriores e iguales a v1.18.10, versiones anteriores e iguales a v1.17.13, versiones anteriores a v1.20.0-alpha2\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"jordan@liggitt.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.17.0\",\"versionEndIncluding\":\"1.17.13\",\"matchCriteriaId\":\"BAC4DF80-12A5-482D-88C8-1939A015FBE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.18.0\",\"versionEndIncluding\":\"1.18.10\",\"matchCriteriaId\":\"57F3AFC9-8D1D-4870-B40E-5A2CFEB2388E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.19.0\",\"versionEndIncluding\":\"1.19.3\",\"matchCriteriaId\":\"13CE6526-CD5D-4B0D-AE8C-20E113F2D412\"}]}]}],\"references\":[{\"url\":\"https://github.com/kubernetes/kubernetes/issues/95623\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ\",\"source\":\"jordan@liggitt.net\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kubernetes/kubernetes/issues/95623\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
gsd-2020-8565
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-8565", "description": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2.", "id": "GSD-2020-8565", "references": [ "https://www.suse.com/security/cve/CVE-2020-8565.html", "https://access.redhat.com/errata/RHSA-2021:5086", "https://access.redhat.com/errata/RHSA-2021:5085", "https://access.redhat.com/errata/RHBA-2021:3003", "https://access.redhat.com/errata/RHSA-2021:2041" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-8565" ], "details": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2.", "id": "GSD-2020-8565", "modified": "2023-12-13T01:21:54.456729Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@kubernetes.io", "DATE_PUBLIC": "2020-10-15T04:00:00.000Z", "ID": "CVE-2020-8565", "STATE": "PUBLIC", "TITLE": "Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Kubernetes", "version": { "version_data": [ { "version_value": "\u003c= 1.19.3" }, { "version_value": "\u003c= 1.18.10" }, { "version_value": "\u003c= 1.17.13" }, { "version_value": "\u003c 1.20.0-alpha2" } ] } } ] }, "vendor_name": "Kubernetes" } ] } }, "credit": [ { "lang": "eng", "value": "Patrick Rhomberg (purelyapplied)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532 Information Exposure Through Log Files" } ] } ] }, "references": { "reference_data": [ { "name": "Multiple secret leaks when verbose logging is enabled", "refsource": "MLIST", "url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ" }, { "name": "https://github.com/kubernetes/kubernetes/issues/95623", "refsource": "CONFIRM", "url": "https://github.com/kubernetes/kubernetes/issues/95623" } ] }, "source": { "defect": [ "https://github.com/kubernetes/kubernetes/issues/95623" ], "discovery": "EXTERNAL" }, "work_around": [ { "lang": "eng", "value": "Do not enable verbose logging in production (log level \u003e= 9), limit access to logs." } ] }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v1.17.0 \u003c=v1.17.13 || \u003e=v1.18.0 \u003c=v1.18.10 || \u003e=v1.19.0 \u003c=v1.19.3", "affected_versions": "All versions starting from 1.17.0 up to 1.17.13, all versions starting from 1.18.0 up to 1.18.10, all versions starting from 1.19.0 up to 1.19.3", "cvss_v2": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-532", "CWE-937" ], "date": "2020-12-08", "description": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files.", "fixed_versions": [ "v1.17.14-rc.0", "v1.18.11-rc.0", "v1.19.4-rc.0" ], "identifier": "CVE-2020-8565", "identifiers": [ "CVE-2020-8565" ], "not_impacted": "All versions before 1.17.0, all versions after 1.17.13 before 1.18.0, all versions after 1.18.10 before 1.19.0, all versions after 1.19.3", "package_slug": "go/github.com/kubernetes/kubernetes", "pubdate": "2020-12-07", "solution": "Upgrade to versions 1.17.14-rc.0, 1.18.11-rc.0, 1.19.4-rc.0 or above. *Note*: 1.17.14-rc.0, 1.18.11-rc.0, and 1.19.4-rc.0 may be unstable versions. Use caution.", "title": "Inclusion of Sensitive Information in Log Files", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" ], "uuid": "47a4ccf2-1175-4739-b9b6-d2af792fd7ce", "versions": [ { "commit": { "sha": "02a9c9f39a18ee40c37835c36c7c80e0797b0d85", "tags": [ "v1.17.0" ], "timestamp": "20191206012503" }, "number": "v1.17.0" }, { "commit": { "sha": "f6cc41b23ef90243e9dbba5fbad501630caaa737", "tags": [ "v1.18.0" ], "timestamp": "20200325144952" }, "number": "v1.18.0" }, { "commit": { "sha": "0fc1dcd829d621ec5605d3eeb381e728371da832", "tags": [ "v1.19.0" ], "timestamp": "20200826142205" }, "number": "v1.19.0" }, { "commit": { "sha": "f8f9da017bafd927ba0e1046572a914e3341a42f", "tags": [ "v1.19.4-rc.0" ], "timestamp": "20201014123937" }, "number": "v1.19.4-rc.0" }, { "commit": { "sha": "c3dc35c4e9145c1b9f6b2f14545b3d76ca1e0a3b", "tags": [ "v1.19.3" ], "timestamp": "20201014123937" }, "number": "v1.19.3" }, { "commit": { "sha": "8103ff82e083f536b3a6cdfdb1f8621cc827981a", "tags": [ "v1.17.13" ], "timestamp": "20201015005831" }, "number": "v1.17.13" }, { "commit": { "sha": "3ab59c453ca5a23325330317856061a11059be47", "tags": [ "v1.17.14-rc.0" ], "timestamp": "20201015005832" }, "number": "v1.17.14-rc.0" }, { "commit": { "sha": "1eaa7b6516ecf87a518a94f95e260487db272b88", "tags": [ "v1.18.10" ], "timestamp": "20201015014302" }, "number": "v1.18.10" }, { "commit": { "sha": "5a35729e05e1bcf398d82b3c97f24ad925f9f8d7", "tags": [ "v1.18.11-rc.0" ], "timestamp": "20201015014303" }, "number": "v1.18.11-rc.0" } ] }, { "affected_range": "\u003c0.20.0-alpha.2", "affected_versions": "All versions before 0.20.0-alpha.2", "cvss_v2": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-532", "CWE-937" ], "date": "2023-02-06", "description": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2.", "fixed_versions": [ "0.20.0-alpha.2" ], "identifier": "CVE-2020-8565", "identifiers": [ "GHSA-8cfg-vx93-jvxw", "CVE-2020-8565" ], "not_impacted": "All versions starting from 0.20.0-alpha.2", "package_slug": "go/k8s.io/client-go", "pubdate": "2023-02-06", "solution": "Upgrade to version 0.20.0-alpha.2 or above. *Note*: 0.20.0-alpha.2 may be an unstable version. Use caution.", "title": "Insertion of Sensitive Information into Log File", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "https://github.com/kubernetes/kubernetes/issues/95623", "https://github.com/kubernetes/kubernetes/pull/95316", "https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419", "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ", "https://pkg.go.dev/vuln/GO-2021-0064", "https://github.com/advisories/GHSA-8cfg-vx93-jvxw" ], "uuid": "ada6ab53-db90-4466-80bd-1335e9bdfa57" }, { "affected_range": "\u003c1.20.0-alpha.2", "affected_versions": "All versions before 1.20.0-alpha.2", "cvss_v2": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-532", "CWE-937" ], "date": "2023-02-06", "description": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2.", "fixed_versions": [ "1.20.0-alpha.2" ], "identifier": "CVE-2020-8565", "identifiers": [ "GHSA-8cfg-vx93-jvxw", "CVE-2020-8565" ], "not_impacted": "All versions starting from 1.20.0-alpha.2", "package_slug": "go/k8s.io/kubernetes", "pubdate": "2023-02-06", "solution": "Upgrade to version 1.20.0-alpha.2 or above. *Note*: 1.20.0-alpha.2 may be an unstable version. Use caution.", "title": "Insertion of Sensitive Information into Log File", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "https://github.com/kubernetes/kubernetes/issues/95623", "https://github.com/kubernetes/kubernetes/pull/95316", "https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419", "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ", "https://pkg.go.dev/vuln/GO-2021-0064", "https://github.com/advisories/GHSA-8cfg-vx93-jvxw" ], "uuid": "9c396e9d-d3de-4cd9-8a9b-be871b1ad4e9" }, { "affected_range": "\u003e=1.17.0 \u003c1.17.16||\u003e=1.18.0 \u003c1.18.14||\u003e=1.19.0 \u003c1.19.6", "affected_versions": "All versions starting from 1.17.0 before 1.17.16, all versions starting from 1.18.0 before 1.18.14, all versions starting from 1.19.0 before 1.19.6", "cvss_v2": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-532", "CWE-937" ], "date": "2020-12-08", "description": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl.", "fixed_versions": [ "1.17.16", "1.18.14", "1.19.6", "1.20.0" ], "identifier": "CVE-2020-8565", "identifiers": [ "CVE-2020-8565" ], "not_impacted": "All versions starting from 1.17.16 before 1.18.0, all versions starting from 1.18.14 before 1.19.0, all versions starting from 1.19.6", "package_slug": "go/k8s.io/kubernetes/pkg/apis/apps/validation", "pubdate": "2020-12-07", "solution": "Upgrade to version 1.17.16, 1.18.14, 1.19.6, 1.20.0 or above.", "title": "Inclusion of Sensitive Information in Log Files", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" ], "uuid": "08ca0fa3-fdcd-4496-8e23-4ee7192999be" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.17.13", "versionStartIncluding": "1.17.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.18.10", "versionStartIncluding": "1.18.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.19.3", "versionStartIncluding": "1.19.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@kubernetes.io", "ID": "CVE-2020-8565" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.3, \u003c= v1.18.10, \u003c= v1.17.13, \u003c v1.20.0-alpha2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-532" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/kubernetes/kubernetes/issues/95623", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "name": "Multiple secret leaks when verbose logging is enabled", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2020-12-08T19:51Z", "publishedDate": "2020-12-07T22:15Z" } } }
ghsa-8cfg-vx93-jvxw
Vulnerability from github
Published
2023-02-06 23:27
Modified
2024-05-20 19:48
Severity ?
Summary
Kubernetes client-go vulnerable to Sensitive Information Leak via Log File
Details
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.5, <= v1.18.13, <= v1.17.15, < v1.20.0-alpha2.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "k8s.io/client-go" }, "ranges": [ { "events": [ { "introduced": "0.19.0" }, { "fixed": "0.19.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "k8s.io/client-go" }, "ranges": [ { "events": [ { "introduced": "0.20.0-alpha.0" }, { "fixed": "0.20.0-alpha.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "k8s.io/client-go" }, "ranges": [ { "events": [ { "introduced": "0.18.0" }, { "fixed": "0.18.14" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "k8s.io/client-go" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.17.16" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "k8s.io/kubernetes" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.20.0-alpha.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-8565" ], "database_specific": { "cwe_ids": [ "CWE-532" ], "github_reviewed": true, "github_reviewed_at": "2023-02-06T23:27:56Z", "nvd_published_at": null, "severity": "MODERATE" }, "details": "In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects \u003c= v1.19.5, \u003c= v1.18.13, \u003c= v1.17.15, \u003c v1.20.0-alpha2.", "id": "GHSA-8cfg-vx93-jvxw", "modified": "2024-05-20T19:48:09Z", "published": "2023-02-06T23:27:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/95316" }, { "type": "WEB", "url": "https://github.com/kubernetes/client-go/commit/19875a3d5a2e0d4f51c976a9e0662de3c2c011e3" }, { "type": "WEB", "url": "https://github.com/kubernetes/client-go/commit/1b8383fc150c9b816b0072032cca75754c2734d0" }, { "type": "WEB", "url": "https://github.com/kubernetes/client-go/commit/44e1a07f2d513e375c4b6ee6e890040b47befe86" }, { "type": "WEB", "url": "https://github.com/kubernetes/client-go/commit/e8f871a2e5fadf90fc114565abc0963967f1a373" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419" }, { "type": "PACKAGE", "url": "https://github.com/kubernetes/client-go" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2021-0064" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Kubernetes client-go vulnerable to Sensitive Information Leak via Log File" }
rhsa-2021_2041
Vulnerability from csaf_redhat
Published
2021-05-19 09:14
Modified
2024-12-17 21:13
Summary
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.7.0 security, bug fix, and enhancement update
Notes
Topic
Updated images which include numerous security fixes, bug fixes, and enhancements are now available for Red Hat OpenShift Container Storage 4.7.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 (CVE-2020-8565)
* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)
* nodejs-date-and-time: ReDoS in parsing via date.compile (CVE-2020-26289)
* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)
* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)
* NooBaa: noobaa-operator leaking RPC AuthToken into log files (CVE-2021-3528)
* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
This update includes various bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.7/html-single/4.7_release_notes/index
All Red Hat OpenShift Container Storage users are advised to upgrade to these updated images.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images which include numerous security fixes, bug fixes, and enhancements are now available for Red Hat OpenShift Container Storage 4.7.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9 (CVE-2020-8565)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* nodejs-date-and-time: ReDoS in parsing via date.compile (CVE-2020-26289)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* NooBaa: noobaa-operator leaking RPC AuthToken into log files (CVE-2021-3528)\n\n* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\nThis update includes various bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.7/html-single/4.7_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to these updated images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2041", "url": "https://access.redhat.com/errata/RHSA-2021:2041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1803849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1803849" }, { "category": "external", "summary": "1814681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814681" }, { "category": "external", "summary": "1840004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004" }, { "category": "external", "summary": "1850089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850089" }, { "category": "external", "summary": "1860594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860594" }, { "category": "external", "summary": "1861104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861104" }, { "category": "external", "summary": "1861878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861878" }, { "category": "external", "summary": "1866301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866301" }, { "category": "external", "summary": "1869406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869406" }, { "category": "external", "summary": "1872730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872730" }, { "category": "external", "summary": "1874367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874367" }, { "category": "external", "summary": "1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "1886112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886112" }, { "category": "external", "summary": "1886416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886416" }, { "category": "external", "summary": "1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "1888839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888839" }, { "category": "external", "summary": "1892622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892622" }, { "category": "external", "summary": "1893611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893611" }, { "category": "external", "summary": "1893613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893613" }, { "category": "external", "summary": "1893619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893619" }, { "category": "external", "summary": "1894412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894412" }, { "category": "external", "summary": "1896338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896338" }, { "category": "external", "summary": "1897246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897246" }, { "category": "external", "summary": "1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "1898509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898509" }, { "category": "external", "summary": "1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "1898808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898808" }, { "category": "external", "summary": "1900711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900711" }, { "category": "external", "summary": "1900722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900722" }, { "category": "external", "summary": "1900749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900749" }, { "category": "external", "summary": "1900760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900760" }, { "category": "external", "summary": "1901134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901134" }, { "category": "external", "summary": "1902192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902192" }, { "category": "external", "summary": "1902685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902685" }, { "category": "external", "summary": "1902711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902711" }, { "category": "external", "summary": "1903973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903973" }, { "category": "external", "summary": "1903975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903975" }, { "category": "external", "summary": "1904302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904302" }, { "category": "external", "summary": "1904929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904929" }, { "category": "external", "summary": "1907318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907318" }, { "category": "external", "summary": "1908414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908414" }, { "category": "external", "summary": "1908678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908678" }, { "category": "external", "summary": "1909268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909268" }, { "category": "external", "summary": "1909488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909488" }, { "category": "external", "summary": "1909745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909745" }, { "category": "external", "summary": "1910705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910705" }, { "category": "external", "summary": "1911131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911131" }, { "category": "external", "summary": "1911266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911266" }, { "category": "external", "summary": "1911627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911627" }, { "category": "external", "summary": "1911789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911789" }, { "category": "external", "summary": "1912421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912421" }, { "category": "external", "summary": "1912894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912894" }, { "category": "external", "summary": "1913149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913149" }, { "category": "external", "summary": "1913357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913357" }, { "category": "external", "summary": "1914132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914132" }, { "category": "external", "summary": "1914159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914159" }, { "category": "external", "summary": "1914215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914215" }, { "category": "external", "summary": "1915111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915111" }, { "category": "external", "summary": "1915261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915261" }, { "category": "external", "summary": "1915445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915445" }, { "category": "external", "summary": "1915644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915644" }, { "category": "external", "summary": "1915698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915698" }, { "category": "external", "summary": "1915706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915706" }, { "category": "external", "summary": "1915730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915730" }, { "category": "external", "summary": "1915737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915737" }, { "category": "external", "summary": "1915758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915758" }, { "category": "external", "summary": "1915807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915807" }, { "category": "external", "summary": "1915851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915851" }, { "category": "external", "summary": "1915953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915953" }, { "category": "external", "summary": "1916850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916850" }, { "category": "external", "summary": "1917253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917253" }, { "category": "external", "summary": "1917815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917815" }, { "category": "external", "summary": "1918360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918360" }, { "category": "external", "summary": "1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "1918925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918925" }, { "category": "external", "summary": "1918938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918938" }, { "category": "external", "summary": "1919967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919967" }, { "category": "external", "summary": "1920202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920202" }, { "category": "external", "summary": "1920498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920498" }, { "category": "external", "summary": "1920507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920507" }, { "category": "external", "summary": "1921521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921521" }, { "category": "external", "summary": "1921540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921540" }, { "category": "external", "summary": "1921609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921609" }, { "category": "external", "summary": "1921625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921625" }, { "category": "external", "summary": "1922064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922064" }, { "category": "external", "summary": "1922108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922108" }, { "category": "external", "summary": "1922113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922113" }, { "category": "external", "summary": "1922119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922119" }, { "category": "external", "summary": "1922421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922421" }, { "category": "external", "summary": "1922954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922954" }, { "category": "external", "summary": "1924185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924185" }, { "category": "external", "summary": "1924211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924211" }, { "category": "external", "summary": "1924634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924634" }, { "category": "external", "summary": "1924784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924784" }, { "category": "external", "summary": "1924792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924792" }, { "category": "external", "summary": "1925055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925055" }, { "category": "external", "summary": "1925179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925179" }, { "category": "external", "summary": "1925249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925249" }, { "category": "external", "summary": "1925533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925533" }, { "category": "external", "summary": "1926182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926182" }, { "category": "external", "summary": "1926617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926617" }, { "category": "external", "summary": "1926717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926717" }, { "category": "external", "summary": "1926831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926831" }, { "category": "external", "summary": "1927128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927128" }, { "category": "external", "summary": "1927138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927138" }, { "category": "external", "summary": "1927186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927186" }, { "category": "external", "summary": "1927317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927317" }, { "category": "external", "summary": "1927330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927330" }, { "category": "external", "summary": "1927338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927338" }, { "category": "external", "summary": "1927885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927885" }, { "category": "external", "summary": "1928063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928063" }, { "category": "external", "summary": "1928451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928451" }, { "category": "external", "summary": "1928471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928471" }, { "category": "external", "summary": "1928487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928487" }, { "category": "external", "summary": "1928642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928642" }, { "category": "external", "summary": "1931191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931191" }, { "category": "external", "summary": "1931810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931810" }, { "category": "external", "summary": "1931839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931839" }, { "category": "external", "summary": "1932400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932400" }, { "category": "external", "summary": "1933607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933607" }, { "category": "external", "summary": "1933609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933609" }, { "category": "external", "summary": "1933736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933736" }, { "category": "external", "summary": "1934000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934000" }, { "category": "external", "summary": "1934990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934990" }, { "category": "external", "summary": "1935342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935342" }, { "category": "external", "summary": "1936545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936545" }, { "category": "external", "summary": "1936877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936877" }, { "category": "external", "summary": "1937070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937070" }, { "category": "external", "summary": "1937100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937100" }, { "category": "external", "summary": "1937245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937245" }, { "category": "external", "summary": "1937768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937768" }, { "category": "external", "summary": "1939026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939026" }, { "category": "external", "summary": "1939472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939472" }, { "category": "external", "summary": "1939617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939617" }, { "category": "external", "summary": "1940440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940440" }, { "category": "external", "summary": "1940476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940476" }, { "category": "external", "summary": "1940957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940957" }, { "category": "external", "summary": "1941647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941647" }, { "category": "external", "summary": "1941977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941977" }, { "category": "external", "summary": "1942344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942344" }, { "category": "external", "summary": "1942350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942350" }, { "category": "external", "summary": "1942519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942519" }, { "category": "external", "summary": "1943275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943275" }, { "category": "external", "summary": "1943596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943596" }, { "category": "external", "summary": "1944980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944980" }, { "category": "external", "summary": "1946592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946592" }, { "category": "external", "summary": "1946837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946837" }, { "category": "external", "summary": "1955328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955328" }, { "category": "external", "summary": "1955601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955601" }, { "category": "external", "summary": "1957187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957187" }, { "category": "external", "summary": "1957639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957639" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2041.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.7.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-12-17T21:13:42+00:00", "generator": { "date": "2024-12-17T21:13:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2021:2041", "initial_release_date": "2021-05-19T09:14:24+00:00", "revision_history": [ { "date": "2021-05-19T09:14:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-19T09:14:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:13:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product": { "name": "Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_storage:4.7::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Storage" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "product": { "name": "ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "product_id": "ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.7-102.5c44836.release_4.7" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "product": { "name": "ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "product_id": "ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.7.0-60.2c1fdb0.5.7" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "product_id": "ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.7.0-69.85e2026.5.7" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.7-174.7f14177.release_4.7" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "product": { "name": "ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "product_id": "ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.7.0-11" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "product_id": "ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.7-174.7f14177.release_4.7" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.7-140.49a6fcf.release_4.7" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "product": { "name": "ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "product_id": "ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.7-102.5c44836.release_4.7" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "product": { "name": "ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "product_id": "ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.7.0-60.2c1fdb0.5.7" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "product_id": "ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.7.0-69.85e2026.5.7" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.7-174.7f14177.release_4.7" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "product": { "name": "ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "product_id": "ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.7.0-11" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "product_id": "ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.7-174.7f14177.release_4.7" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.7-140.49a6fcf.release_4.7" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "product": { "name": "ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "product_id": "ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.7-102.5c44836.release_4.7" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "product": { "name": "ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "product_id": "ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.7.0-60.2c1fdb0.5.7" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "product_id": "ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.7.0-69.85e2026.5.7" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.7-174.7f14177.release_4.7" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "product": { "name": "ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "product_id": "ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.7.0-11" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "product_id": "ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.7-174.7f14177.release_4.7" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.7-140.49a6fcf.release_4.7" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64 as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64 as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64 as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64 as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64 as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64 as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64 as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le as a component of Red Hat OpenShift Container Storage 4.7 on RHEL-8", "product_id": "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7608", "cwe": { "id": "CWE-267", "name": "Privilege Defined With Unsafe Actions" }, "discovery_date": "2020-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1840004" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in nodesjs-yargs-parser, where it can be tricked into adding or modifying properties of the Object.prototype using a \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-yargs-parser: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7608" }, { "category": "external", "summary": "RHBZ#1840004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608" } ], "release_date": "2020-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-yargs-parser: prototype pollution vulnerability" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2020-11-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898680" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-y18n: prototype pollution vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-y18n library to authenticated users only, therefore the impact is Low.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of y18n as a dependency of yargs. However, no unsafe usage found where the module accepts untrusted input and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7774" }, { "category": "external", "summary": "RHBZ#1898680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" } ], "release_date": "2020-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-y18n: prototype pollution vulnerability" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2020-26160", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1883371" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.", "title": "Vulnerability description" }, { "category": "summary", "text": "jwt-go: access restriction bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The github.com/dgrijalva/jwt-go module is an indirect dependency of the k8s.io/client-go module pulled into Quay Bridge, and Setup operators via the Operator\u0027s SDK generated code. The k8s.io/client-go module does not use jwt-go in an unsafe way [1]. Red Hat Quay components have been marked as wontfix. This may be fixed in the future.\n\nSimilar to Quay, multiple OpenShift Container Platform (OCP) containers include jwt-go as a transient dependency due to go-autorest [1]. As such, those containers do not use jwt-go in an unsafe way. They have been marked wontfix at this time and may be fixed in a future update.\n\nSame as Quay and OpenShift Container Platform, components shipped with Red Hat OpenShift Container Storage 4 do not use jwt-go in an unsafe way and hence this issue has been rated as having a security impact of Low. A future update may address this issue.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli as a technical preview and is not currently planned to be addressed in future updates, hence the multi-cloud-object-gateway-cli package will not be fixed.\n\n[1] https://github.com/Azure/go-autorest/issues/568#issuecomment-703804062", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26160" }, { "category": "external", "summary": "RHBZ#1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515" } ], "release_date": "2020-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jwt-go: access restriction bypass vulnerability" }, { "cve": "CVE-2020-26289", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1911627" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-date-and-time. In date-and-time there a regular expression involved in parsing which can be exploited to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-date-and-time: ReDoS in parsing via date.compile", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26289" }, { "category": "external", "summary": "RHBZ#1911627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911627" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26289", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26289" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-r92x-f52r-x54g", "url": "https://github.com/advisories/GHSA-r92x-f52r-x54g" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1592", "url": "https://www.npmjs.com/advisories/1592" } ], "release_date": "2020-12-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-date-and-time: ReDoS in parsing via date.compile" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2021-3114", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-01-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1918750" } ], "notes": [ { "category": "description", "text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: incorrect operations on the P-224 curve", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3114" }, { "category": "external", "summary": "RHBZ#1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w", "url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w" } ], "release_date": "2021-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: incorrect operations on the P-224 curve" }, { "acknowledgments": [ { "names": [ "Martin Bukatovic" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-3528", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2021-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1955601" } ], "notes": [ { "category": "description", "text": "A flaw was found in NooBaa, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "NooBaa: noobaa-operator leaking RPC AuthToken into log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3528" }, { "category": "external", "summary": "RHBZ#1955601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3528", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3528" } ], "release_date": "2021-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-19T09:14:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:779479e90095b760fdca7da317aaf09f76b453aa262bd3c1ac0f41f7af483a2d_ppc64le", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:ac0ed0ba8ef78e3b46dcf6936f7d97ac4c0f85ac596f263880b56a12dac36234_amd64", "8Base-RH-OCS-4.7:ocs4/cephcsi-rhel8@sha256:c7b09f1114aa36be379a9f52b3f156499bcd31d7537f1235a364129d1382497c_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:22037eb4c589c5ccf921cd15bb3c82d75fac298d2b53344575c2af7c22d5353c_ppc64le", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:5b1046b56cd5d7cbde64a3cfce800b76b3bd7fb0f535ac2382e97eb8fc93314c_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-core-rhel8@sha256:725dd955d4a2a4c27405d7c0d3141384c1e5bb52276056bc7ab8a35d124dcc0e_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:21e57d86bcf007a70bc5e14ff5f0380a1ea26c4d2d2cdf191e9289d04b1f06e7_amd64", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:94dccc304395df6d8b37f8371737646d07cf289f83b30c78c353e9a4dec05b76_s390x", "8Base-RH-OCS-4.7:ocs4/mcg-rhel8-operator@sha256:bae35f5a3ac521dedd50d8852920f99a3f1c94d1a31a51856eefa24e94516142_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:5e4df11fa489a5aa7a03ff3983c9a35143e3a76667ea652c39b499dbacb9a11d_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:6512915dabeef1d170bd2a61339d6849c175082151bc2f273bef1036738456e0_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-must-gather-rhel8@sha256:ca93487e2344a02ab4da0eb010608082134c7e136f2b3cfa51a2d04b10313b3c_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:70c98f7353bd302c55e6fa2f51cb4385309aafeb4a2901c94b44cee2846679fc_amd64", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:97f334a7c2d147e0cfded896355f7406bd2c893783011e345dbcb474850d0047_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-operator-bundle@sha256:bce44dc4b764b9b3e99d5d2cdc2242667195d6802ee1a5f1f692aa6e633e5660_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:7dca985a1723e1c2169124a70182fd29a633ac7b9e9fa28ae24635e203003bc6_ppc64le", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:e715a9a62462de6c45ca82a3acc5d622d2df12ce965d226eb0a90f1cbfa212c5_s390x", "8Base-RH-OCS-4.7:ocs4/ocs-rhel8-operator@sha256:f6319e4d6e32109deeaebe4d99cc18fd5a272c0655ba73fe2521ca63981efba6_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:1c57a22591b2277403200cf3e254badcc827416fc01efabfd12c03c265a491b2_s390x", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:de99a6b3cefa44dd22c637cfa2fb54c60d2b0e14970466cea19979e2e59668c7_amd64", "8Base-RH-OCS-4.7:ocs4/rook-ceph-rhel8-operator@sha256:e25dc5fd74d37ea3b00898557b71cdefc7d508e748bfb230e18db7c2e3d526f4_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "NooBaa: noobaa-operator leaking RPC AuthToken into log files" } ] }
rhsa-2021_5086
Vulnerability from csaf_redhat
Published
2021-12-13 19:26
Modified
2024-12-17 17:58
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update
Notes
Topic
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated
with and optimized for the Red Hat OpenShift Container Platform. Red Hat
OpenShift Data Foundation is a highly scalable, production-grade persistent
storage for stateful applications running in the Red Hat OpenShift
Container Platform. In addition to persistent storage, Red Hat OpenShift
Data Foundation provisions a multicloud data management service with an S3
compatible API.
Security Fix(es):
* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 (CVE-2020-8565)
* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information refer to the CVE
page(s) listed in the References section.
These updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to
these updated images, which provide numerous bug fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Data Foundation is a highly scalable, production-grade persistent\nstorage for stateful applications running in the Red Hat OpenShift\nContainer Platform. In addition to persistent storage, Red Hat OpenShift\nData Foundation provisions a multicloud data management service with an S3\ncompatible API.\n\nSecurity Fix(es):\n\n* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9 (CVE-2020-8565)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.\n\nThese updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to\nthese updated images, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5086", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1810525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810525" }, { "category": "external", "summary": "1853638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853638" }, { "category": "external", "summary": "1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "1890438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890438" }, { "category": "external", "summary": "1890978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890978" }, { "category": "external", "summary": "1892709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892709" }, { "category": "external", "summary": "1901954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901954" }, { "category": "external", "summary": "1910790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910790" }, { "category": "external", "summary": "1927782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927782" }, { "category": "external", "summary": "1929242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929242" }, { "category": "external", "summary": "1932396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932396" }, { "category": "external", "summary": "1934625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934625" }, { "category": "external", "summary": "1956285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956285" }, { "category": "external", "summary": "1959793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959793" }, { "category": "external", "summary": "1964083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964083" }, { "category": "external", "summary": "1965322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965322" }, { "category": "external", "summary": "1968510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968510" }, { "category": "external", "summary": "1968606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968606" }, { "category": "external", "summary": "1969216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969216" }, { "category": "external", "summary": "1973256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973256" }, { "category": "external", "summary": "1975272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975272" }, { "category": "external", "summary": "1975581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975581" }, { "category": "external", "summary": "1979244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979244" }, { "category": "external", "summary": "1979502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979502" }, { "category": "external", "summary": "1980818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980818" }, { "category": "external", "summary": "1981331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981331" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983756" }, { "category": "external", "summary": "1984284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984284" }, { "category": "external", "summary": "1984334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984334" }, { "category": "external", "summary": "1984396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984396" }, { "category": "external", "summary": "1984735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984735" }, { "category": "external", "summary": "1985074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985074" }, { "category": "external", "summary": "1986444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986444" }, { "category": "external", "summary": "1986794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986794" }, { "category": "external", "summary": "1987806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987806" }, { "category": "external", "summary": "1988518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988518" }, { "category": "external", "summary": "1989482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989482" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990230" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1991822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991822" }, { "category": "external", "summary": "1992472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992472" }, { "category": "external", "summary": "1994261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994261" }, { "category": "external", "summary": "1994577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994577" }, { "category": "external", "summary": "1994584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994584" }, { "category": "external", "summary": "1994602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994602" }, { "category": "external", "summary": "1994606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994606" }, { "category": "external", "summary": "1994687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994687" }, { "category": "external", "summary": "1995009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995009" }, { "category": "external", "summary": "1995056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995056" }, { "category": "external", "summary": "1995271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995271" }, { "category": "external", "summary": "1995718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995718" }, { "category": "external", "summary": "1997237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997237" }, { "category": "external", "summary": "1997624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997624" }, { "category": "external", "summary": "1997738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997738" }, { "category": "external", "summary": "1997922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997922" }, { "category": "external", "summary": "1998851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998851" }, { "category": "external", "summary": "1999050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999050" }, { "category": "external", "summary": "1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "1999748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999748" }, { "category": "external", "summary": "1999763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999763" }, { "category": "external", "summary": "1999767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999767" }, { "category": "external", "summary": "2000082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000082" }, { "category": "external", "summary": "2000098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000098" }, { "category": "external", "summary": "2000143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000143" }, { "category": "external", "summary": "2000190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000190" }, { "category": "external", "summary": "2000579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000579" }, { "category": "external", "summary": "2000588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000588" }, { "category": "external", "summary": "2000860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000860" }, { "category": "external", "summary": "2000865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000865" }, { "category": "external", "summary": "2001482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001482" }, { "category": "external", "summary": "2001539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001539" }, { "category": "external", "summary": "2001580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001580" }, { "category": "external", "summary": "2001970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001970" }, { "category": "external", "summary": "2002225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002225" }, { "category": "external", "summary": "2003444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003444" }, { "category": "external", "summary": "2003904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003904" }, { "category": "external", "summary": "2004003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004003" }, { "category": "external", "summary": "2004013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004013" }, { "category": "external", "summary": "2004030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004030" }, { "category": "external", "summary": "2004824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004824" }, { "category": "external", "summary": "2005103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005103" }, { "category": "external", "summary": "2005290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005290" }, { "category": "external", "summary": "2005812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005812" }, { "category": "external", "summary": "2005838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005838" }, { "category": "external", "summary": "2005843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005843" }, { "category": "external", "summary": "2005937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005937" }, { "category": "external", "summary": "2006176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006176" }, { "category": "external", "summary": "2006865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006865" }, { "category": "external", "summary": "2007130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007130" }, { "category": "external", "summary": "2007202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007202" }, { "category": "external", "summary": "2007212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007212" }, { "category": "external", "summary": "2007377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007377" }, { "category": "external", "summary": "2007717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007717" }, { "category": "external", "summary": "2010041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010041" }, { "category": "external", "summary": "2010185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010185" }, { "category": "external", "summary": "2010188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010188" }, { "category": "external", "summary": "2010194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010194" }, { "category": "external", "summary": "2010202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010202" }, { "category": "external", "summary": "2011225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011225" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5086.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update", "tracking": { "current_release_date": "2024-12-17T17:58:27+00:00", "generator": { "date": "2024-12-17T17:58:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2021:5086", "initial_release_date": "2021-12-13T19:26:22+00:00", "revision_history": [ { "date": "2021-12-13T19:26:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-13T19:26:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T17:58:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product": { "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_id": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_id": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_id": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_id": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999731" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37701" }, { "category": "external", "summary": "RHBZ#1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37701", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1779", "url": "https://www.npmjs.com/advisories/1779" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999739" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37712" }, { "category": "external", "summary": "RHBZ#1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1780", "url": "https://www.npmjs.com/advisories/1780" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" } ] }
rhsa-2021_5085
Vulnerability from csaf_redhat
Published
2021-12-13 15:29
Modified
2024-12-17 17:58
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update
Notes
Topic
Updated Multicloud Object Gateway command line (mcg) packages that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 (CVE-2020-8565)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
These updated Multicloud Object Gateway command line (mcg) packages
include numerous bug fixes and enhancements. Space precludes documenting
all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most
significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Multicloud Object Gateway command line (mcg) packages that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n\n* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9 (CVE-2020-8565)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated Multicloud Object Gateway command line (mcg) packages\ninclude numerous bug fixes and enhancements. Space precludes documenting\nall of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most\nsignificant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5085", "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1996033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996033" }, { "category": "external", "summary": "1998680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998680" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5085.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update", "tracking": { "current_release_date": "2024-12-17T17:58:20+00:00", "generator": { "date": "2024-12-17T17:58:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2021:5085", "initial_release_date": "2021-12-13T15:29:11+00:00", "revision_history": [ { "date": "2021-12-13T15:29:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-13T15:29:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T17:58:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product": { "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "relates_to_product_reference": "8Base-RH-ODF-4.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T15:29:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T15:29:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T15:29:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T15:29:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T15:29:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhba-2021_3003
Vulnerability from csaf_redhat
Published
2021-08-03 18:15
Modified
2024-12-17 21:12
Summary
Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.8.0 container images bug fix and enhancement update
Notes
Topic
Updated images that include numerous bug fixes and enhancements are now available for Red Hat OpenShift Container Storage 4.8.0 on Red Hat Enterprise Linux 8.
Details
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
These updated images include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_openshift_container_s
torage/4.8/html/4.8_release_notes/index
All Red Hat OpenShift Container Storage users are advised to upgrade to these updated images, which provide numerous bug fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous bug fixes and enhancements are now available for Red Hat OpenShift Container Storage 4.8.0 on Red Hat Enterprise Linux 8.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated images include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_s\ntorage/4.8/html/4.8_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to these updated images, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2021:3003", "url": "https://access.redhat.com/errata/RHBA-2021:3003" }, { "category": "external", "summary": "1819483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819483" }, { "category": "external", "summary": "1848278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848278" }, { "category": "external", "summary": "1918783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918783" }, { "category": "external", "summary": "1923819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923819" }, { "category": "external", "summary": "1924946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924946" }, { "category": "external", "summary": "1924949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924949" }, { "category": "external", "summary": "1929209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929209" }, { "category": "external", "summary": "1934633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934633" }, { "category": "external", "summary": "1936388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936388" }, { "category": "external", "summary": "1936858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936858" }, { "category": "external", "summary": "1937604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937604" }, { "category": "external", "summary": "1938112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1938112" }, { "category": "external", "summary": "1939007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939007" }, { "category": "external", "summary": "1940312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940312" }, { "category": "external", "summary": "1943280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943280" }, { "category": "external", "summary": "1944158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944158" }, { "category": "external", "summary": "1944410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944410" }, { "category": "external", "summary": "1946595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946595" }, { "category": "external", "summary": "1947796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947796" }, { "category": "external", "summary": "1948378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948378" }, { "category": "external", "summary": "1950225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950225" }, { "category": "external", "summary": "1950419", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950419" }, { "category": "external", "summary": "1952344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952344" }, { "category": "external", "summary": "1953572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953572" }, { "category": "external", "summary": "1955831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955831" }, { "category": "external", "summary": "1956232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956232" }, { "category": "external", "summary": "1956256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956256" }, { "category": "external", "summary": "1957712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957712" }, { "category": "external", "summary": "1958373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958373" }, { "category": "external", "summary": "1959257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959257" }, { "category": "external", "summary": "1959964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959964" }, { "category": "external", "summary": "1961517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961517" }, { "category": "external", "summary": "1961647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961647" }, { "category": "external", "summary": "1962109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962109" }, { "category": "external", "summary": "1962207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962207" }, { "category": "external", "summary": "1962278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962278" }, { "category": "external", "summary": "1962751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962751" }, { "category": "external", "summary": "1962755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962755" }, { "category": "external", "summary": "1963134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963134" }, { "category": "external", "summary": "1963191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963191" }, { "category": "external", "summary": "1964238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964238" }, { "category": "external", "summary": "1964373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964373" }, { "category": "external", "summary": "1964467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964467" }, { "category": "external", "summary": "1965290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965290" }, { "category": "external", "summary": "1966149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966149" }, { "category": "external", "summary": "1966661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966661" }, { "category": "external", "summary": "1966999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966999" }, { "category": "external", "summary": "1967628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967628" }, { "category": "external", "summary": "1967837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967837" }, { "category": "external", "summary": "1967877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967877" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_3003.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.8.0 container images bug fix and enhancement update", "tracking": { "current_release_date": "2024-12-17T21:12:27+00:00", "generator": { "date": "2024-12-17T21:12:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHBA-2021:3003", "initial_release_date": "2021-08-03T18:15:00+00:00", "revision_history": [ { "date": "2021-08-03T18:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-03T18:15:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:12:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product": { "name": "Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_storage:4.8::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Storage" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "product": { "name": "ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "product_id": "ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.8-125.01872cc.release_4.8" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "product": { "name": "ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "product_id": "ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.8.0-38.e060925.5.8" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "product_id": "ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.8.0-27.4a6ca5f.5.8" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.8-196.a35d7d7.release_4.8" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "product": { "name": "ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "product_id": "ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.8.0-5" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "product_id": "ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.8-196.a35d7d7.release_4.8" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.8-167.9a9db5f.release_4.8" } } }, { "category": "product_version", "name": "ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "product": { "name": "ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "product_id": "ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/volume-replication-rhel8-operator\u0026tag=4.8-20.ab575a2.release_v0.1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "product": { "name": "ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "product_id": "ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.8-125.01872cc.release_4.8" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "product": { "name": "ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "product_id": "ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.8.0-38.e060925.5.8" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "product_id": "ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.8.0-27.4a6ca5f.5.8" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.8-196.a35d7d7.release_4.8" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "product": { "name": "ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "product_id": "ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.8.0-5" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "product_id": "ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.8-196.a35d7d7.release_4.8" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.8-167.9a9db5f.release_4.8" } } }, { "category": "product_version", "name": "ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "product": { "name": "ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "product_id": "ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/volume-replication-rhel8-operator\u0026tag=4.8-20.ab575a2.release_v0.1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "product": { "name": "ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "product_id": "ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.8-125.01872cc.release_4.8" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "product": { "name": "ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "product_id": "ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.8.0-38.e060925.5.8" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "product_id": "ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.8.0-27.4a6ca5f.5.8" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.8-196.a35d7d7.release_4.8" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "product": { "name": "ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "product_id": "ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.8.0-5" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "product_id": "ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.8-196.a35d7d7.release_4.8" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.8-167.9a9db5f.release_4.8" } } }, { "category": "product_version", "name": "ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le", "product": { "name": "ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le", "product_id": "ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/volume-replication-rhel8-operator\u0026tag=4.8-20.ab575a2.release_v0.1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64 as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64" }, "product_reference": "ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x" }, "product_reference": "ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le as a component of Red Hat OpenShift Container Storage 4.8 on RHEL-8", "product_id": "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" }, "product_reference": "ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.8" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-03T18:15:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:3003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2021-3529", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950479" } ], "notes": [ { "category": "description", "text": "A flaw was found in noobaa-core. This flaw results in the name of an arbitrary URL copied into an HTML document as plain text between tags, including a potential payload script. The input is echoed unmodified in the application response, resulting in arbitrary JavaScript being injected into an application\u0027s response. The highest threat to the system is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "noobaa-core: Cross-site scripting vulnerability with noobaa management URL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3529" }, { "category": "external", "summary": "RHBZ#1950479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950479" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3529", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3529" } ], "release_date": "2021-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-03T18:15:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:3003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "noobaa-core: Cross-site scripting vulnerability with noobaa management URL" }, { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-03T18:15:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:3003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:1819cba5b8d43c37d8b4521ffe5cbd59bd54be42953a08380cd709eb45fa0cd7_amd64", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:a8b8bf6dbc9066e3e0357f2ee2280137fb4071b7410680c92df85ff3f61e3e71_s390x", "8Base-RH-OCS-4.8:ocs4/cephcsi-rhel8@sha256:fd09ea1209f059743c68f8c5a6d96bf0d194382e596281b7a79eebc75cae8781_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:0cb74e8ebd0ec62591a86497e2557e606c1eca91560a2c302442aafdee9d2ba3_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:3c805f5f71b7fbc3d77f05e0eb04a242ee277ded61121a2f78f58a6f2e3d6239_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-core-rhel8@sha256:a35b39d108c85722af235fa856c239a4f9c16a6c60664d91672c680e3fd1e735_ppc64le", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:260bc0e079e4d8e7d29c0480f6a70278709f27a12cd70bb2fb9cbe6334af3333_amd64", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:76353560ad951875d5a031ccee8ffc13f6424b14f4f477b4ce6bbc71edbadc86_s390x", "8Base-RH-OCS-4.8:ocs4/mcg-rhel8-operator@sha256:aa285fae19902f0fe3aa80f17024ffeba8b3cff017b4e5c02e220cbd80c06973_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:180ca4c2ca1f8bfd59251ef37dc6f0b0c6f6b651383dad7a34ef67c0374617f5_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:2c24b0616e961f1c95fe84abccc01ab79d91f8cc2add3035c2821c0fd49ee675_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-must-gather-rhel8@sha256:cc4d487f0ed7beb0662489ffb48ed7ee1a7d95a08f2f959af3d2425a082e5d99_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:644bf5f6e364ba10268d76ee5919bd8f48a772644dba85612730e3792e0f4ea1_s390x", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:851d87a64e1e9f4777791b20fc6c7e4252e779f79d3ecc09bd7af3f9395de771_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-operator-bundle@sha256:91515bf10db2c19a059a16e4df1a331f4b919f2eb1ab11d2a09d054f38fe1fc7_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:8e6d5a070f6be7ee8558d4629483af9bae4259d78fe677d5855b75317939621f_amd64", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:b8f2788c69ac85df91ddc16c9e3d228e638b4deafb5227be521ae343d3010baa_ppc64le", "8Base-RH-OCS-4.8:ocs4/ocs-rhel8-operator@sha256:f7a29c6ef520ef1728ce6c1caeb84f6a4d7c8e3f2f46daf373403d34543df36f_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:19b8b9aa50c96c9b8ee26d3f1778fa3394ec7e042f81a6eef593b003622fa6f8_amd64", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:25682019c97995e63d466115157158f661c3e38c697a03ee2d488a04f2f4adec_s390x", "8Base-RH-OCS-4.8:ocs4/rook-ceph-rhel8-operator@sha256:ed689445f56e7e50d872f2e0b0d61bdf4c08d4bd34daf246ff49648d3f5a298d_ppc64le", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:45210e36c8bb62080cb96c7a9aaefffa22e8749bfbe0e2e3f66b7d36e3f40b3f_amd64", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:695c55a8d65caf60e902b45afa80f59959d3a47c271150f9779b02e77f6c2068_s390x", "8Base-RH-OCS-4.8:ocs4/volume-replication-rhel8-operator@sha256:c33567da3a51dc79c490f635b201359c41391aae1fcc071ea6b6862f344e6784_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.