Action not permitted
Modal body text goes here.
CVE-2021-21671
Vulnerability from cvelistv5
Published
2021-06-30 16:45
Modified
2024-08-03 18:23
Severity ?
EPSS score ?
Summary
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
References
▼ | URL | Tags | |
---|---|---|---|
jenkinsci-cert@googlegroups.com | http://www.openwall.com/lists/oss-security/2021/06/30/1 | Mailing List, Third Party Advisory | |
jenkinsci-cert@googlegroups.com | https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371 | Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:23:27.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" }, { "name": "[oss-security] 20210630 Multiple vulnerabilities in Jenkins and Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/06/30/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins", "vendor": "Jenkins project", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.266", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "LTS 2.277.1", "versionType": "custom" }, { "lessThanOrEqual": "2.299", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "LTS 2.289.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login." } ], "providerMetadata": { "dateUpdated": "2023-10-24T15:51:39.613Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" }, { "name": "[oss-security] 20210630 Multiple vulnerabilities in Jenkins and Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/06/30/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2021-21671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.266" }, { "version_affected": "\u003e=", "version_value": "LTS 2.277.1" }, { "version_affected": "\u003c=", "version_value": "2.299" }, { "version_affected": "\u003c=", "version_value": "LTS 2.289.1" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-384: Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371", "refsource": "CONFIRM", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" }, { "name": "[oss-security] 20210630 Multiple vulnerabilities in Jenkins and Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/06/30/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2021-21671", "datePublished": "2021-06-30T16:45:17", "dateReserved": "2021-01-04T00:00:00", "dateUpdated": "2024-08-03T18:23:27.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-21671\",\"sourceIdentifier\":\"jenkinsci-cert@googlegroups.com\",\"published\":\"2021-06-30T17:15:08.987\",\"lastModified\":\"2023-10-25T18:16:51.073\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.\"},{\"lang\":\"es\",\"value\":\"Jenkins versiones 2.299 y anteriores, versiones LTS 2.289.1 y anteriores no invalidan la sesi\u00f3n anterior al iniciar sesi\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.1},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"2.266\",\"versionEndExcluding\":\"2.300\",\"matchCriteriaId\":\"8D9CE6EE-338A-4D59-A6C6-76E714522572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"2.277.1\",\"versionEndExcluding\":\"2.289.2\",\"matchCriteriaId\":\"17720296-D50E-4F54-8A35-613F40AC546A\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/06/30/1\",\"source\":\"jenkinsci-cert@googlegroups.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371\",\"source\":\"jenkinsci-cert@googlegroups.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
rhba-2021_3033
Vulnerability from csaf_redhat
Published
2021-08-17 12:16
Modified
2024-11-22 17:21
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.24 packages update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.24 is now available with
updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.7.24. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:3032
All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.24 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.24. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:3032\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2021:3033", "url": "https://access.redhat.com/errata/RHBA-2021:3033" }, { "category": "external", "summary": "1991349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991349" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_3033.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.24 packages update", "tracking": { "current_release_date": "2024-11-22T17:21:59+00:00", "generator": { "date": "2024-11-22T17:21:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2021:3033", "initial_release_date": "2021-08-17T12:16:09+00:00", "revision_history": [ { "date": "2021-08-17T12:16:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-17T12:16:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T17:21:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "product": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "product_id": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-8.rhaos4.7.git74c6592.el7?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.289.2.1628252553-1.el8.src", "product": { "name": "jenkins-0:2.289.2.1628252553-1.el8.src", "product_id": "jenkins-0:2.289.2.1628252553-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.2.1628252553-1.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "product": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "product_id": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-8.rhaos4.7.git74c6592.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "product": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "product_id": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-8.rhaos4.7.git74c6592.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-8.rhaos4.7.git74c6592.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product_id": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-8.rhaos4.7.git74c6592.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product_id": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.4-8.rhaos4.7.git74c6592.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-8.rhaos4.7.git74c6592.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jenkins-0:2.289.2.1628252553-1.el8.noarch", "product": { "name": "jenkins-0:2.289.2.1628252553-1.el8.noarch", "product_id": "jenkins-0:2.289.2.1628252553-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.2.1628252553-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product_id": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-8.rhaos4.7.git74c6592.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.4-8.rhaos4.7.git74c6592.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-8.rhaos4.7.git74c6592.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product_id": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-8.rhaos4.7.git74c6592.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product_id": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.4-8.rhaos4.7.git74c6592.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product_id": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-8.rhaos4.7.git74c6592.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src" }, "product_reference": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64" }, "product_reference": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le" }, "product_reference": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x" }, "product_reference": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src" }, "product_reference": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64" }, "product_reference": "cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.2.1628252553-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch" }, "product_reference": "jenkins-0:2.289.2.1628252553-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.2.1628252553-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" }, "product_reference": "jenkins-0:2.289.2.1628252553-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-21670", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007749" } ], "notes": [ { "category": "description", "text": "Incorrect Authorization vulnerability was found in Jenkins. Users with Item/Cancel permission are able to cancel queue items and abort builds of jobs even when they do not have Item/Read permission.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: improper permission checks allow canceling queue items and aborting builds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21670" }, { "category": "external", "summary": "RHBZ#2007749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21670", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T12:16:09+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:3033" }, { "category": "workaround", "details": "As a workaround on earlier versions of Jenkins, do not grant Item/Cancel permission to users who do not have Item/Read permission.", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: improper permission checks allow canceling queue items and aborting builds" }, { "cve": "CVE-2021-21671", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007750" } ], "notes": [ { "category": "description", "text": "Session fixation vulnerability was found in Jenkins. The existing session on login process are not invalidated and this allows an attacker to gain potentially additional access on Jenkins by using social engineering attack techniques on a target user.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: session fixation vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-8.rhaos4.7.git74c6592.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21671" }, { "category": "external", "summary": "RHBZ#2007750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21671", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T12:16:09+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:3033" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.289.2.1628252553-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: session fixation vulnerability" } ] }
rhba-2021_3396
Vulnerability from csaf_redhat
Published
2021-09-08 22:01
Modified
2024-11-22 17:22
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6.44 packages update
Notes
Topic
Red Hat OpenShift Container Platform release 4.6.44 is now available with
updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.44. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:3395
All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.6.44 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.44. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:3395\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2021:3396", "url": "https://access.redhat.com/errata/RHBA-2021:3396" }, { "category": "external", "summary": "1999759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999759" }, { "category": "external", "summary": "2000117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000117" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_3396.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6.44 packages update", "tracking": { "current_release_date": "2024-11-22T17:22:06+00:00", "generator": { "date": "2024-11-22T17:22:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2021:3396", "initial_release_date": "2021-09-08T22:01:25+00:00", "revision_history": [ { "date": "2021-09-08T22:01:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-08T22:01:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T17:22:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "product": { "name": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "product_id": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "product": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "product_id": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-11.rhaos4.6.git66a69b8.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "product": { "name": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "product_id": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "product_id": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "product_id": "jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1629443573-1.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.289.2.1629437819-1.el8.src", "product": { "name": "jenkins-0:2.289.2.1629437819-1.el8.src", "product_id": "jenkins-0:2.289.2.1629437819-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.2.1629437819-1.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "product": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "product_id": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "product": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "product_id": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-11.rhaos4.6.git66a69b8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-11.rhaos4.6.git66a69b8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product_id": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product_id": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1629443573-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.289.2.1629437819-1.el8.noarch", "product": { "name": "jenkins-0:2.289.2.1629437819-1.el8.noarch", "product_id": "jenkins-0:2.289.2.1629437819-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.2.1629437819-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product_id": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product_id": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product_id": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product_id": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-11.rhaos4.6.git66a69b8.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src" }, "product_reference": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64" }, "product_reference": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le" }, "product_reference": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x" }, "product_reference": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src" }, "product_reference": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64" }, "product_reference": "cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.2.1629437819-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch" }, "product_reference": "jenkins-0:2.289.2.1629437819-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.2.1629437819-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src" }, "product_reference": "jenkins-0:2.289.2.1629437819-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.6.1629443573-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-21670", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "8Base-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007749" } ], "notes": [ { "category": "description", "text": "Incorrect Authorization vulnerability was found in Jenkins. Users with Item/Cancel permission are able to cancel queue items and abort builds of jobs even when they do not have Item/Read permission.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: improper permission checks allow canceling queue items and aborting builds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "8Base-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21670" }, { "category": "external", "summary": "RHBZ#2007749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21670", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-08T22:01:25+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:3396" }, { "category": "workaround", "details": "As a workaround on earlier versions of Jenkins, do not grant Item/Cancel permission to users who do not have Item/Read permission.", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "8Base-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: improper permission checks allow canceling queue items and aborting builds" }, { "cve": "CVE-2021-21671", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "8Base-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007750" } ], "notes": [ { "category": "description", "text": "Session fixation vulnerability was found in Jenkins. The existing session on login process are not invalidated and this allows an attacker to gain potentially additional access on Jenkins by using social engineering attack techniques on a target user.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: session fixation vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202108202025.p0.git.4ec6967.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202108202025.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-11.rhaos4.6.git66a69b8.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1629443573-1.el8.src", "8Base-RHOSE-4.6:openshift-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202108202025.p0.git.2b525e8.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202108202025.p0.git.4c3480d.assembly.stream.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202108202025.p0.git.0063daa.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21671" }, { "category": "external", "summary": "RHBZ#2007750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21671", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-08T22:01:25+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:3396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.289.2.1629437819-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: session fixation vulnerability" } ] }
rhsa-2021_3820
Vulnerability from csaf_redhat
Published
2021-10-19 20:23
Modified
2024-11-22 17:41
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.8.15 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.8.15 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.15. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2021:3821
Security Fix(es):
* jenkins: improper permission checks allow canceling queue items and aborting builds (CVE-2021-21670)
* jenkins: session fixation vulnerability (CVE-2021-21671)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.8.15 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.15. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:3821\n\nSecurity Fix(es):\n\n* jenkins: improper permission checks allow canceling queue items and aborting builds (CVE-2021-21670)\n\n* jenkins: session fixation vulnerability (CVE-2021-21671)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3820", "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "2007749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007749" }, { "category": "external", "summary": "2007750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007750" }, { "category": "external", "summary": "2013510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013510" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3820.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.8.15 packages and security update", "tracking": { "current_release_date": "2024-11-22T17:41:26+00:00", "generator": { "date": "2024-11-22T17:41:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3820", "initial_release_date": "2021-10-19T20:23:34+00:00", "revision_history": [ { "date": "2021-10-19T20:23:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-10-19T20:23:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T17:41:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.src", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.src", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.289.3.1633554819-1.el8.src", "product": { "name": "jenkins-0:2.289.3.1633554819-1.el8.src", "product_id": "jenkins-0:2.289.3.1633554819-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.3.1633554819-1.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "product_id": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.8.1633555500-1.el8?arch=src" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.src", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.src", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "product": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_id": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.12.1-2.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_id": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_id": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.12.1-2.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "product": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "product_id": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.12.1-2.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_id": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "product": { "name": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "product_id": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.3.1633554819-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.8.1633555500-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le" }, "product_reference": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x" }, "product_reference": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" }, "product_reference": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.3.1633554819-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch" }, "product_reference": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.3.1633554819-1.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" }, "product_reference": "jenkins-0:2.289.3.1633554819-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-21670", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007749" } ], "notes": [ { "category": "description", "text": "Incorrect Authorization vulnerability was found in Jenkins. Users with Item/Cancel permission are able to cancel queue items and abort builds of jobs even when they do not have Item/Read permission.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: improper permission checks allow canceling queue items and aborting builds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21670" }, { "category": "external", "summary": "RHBZ#2007749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21670", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T20:23:34+00:00", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "workaround", "details": "As a workaround on earlier versions of Jenkins, do not grant Item/Cancel permission to users who do not have Item/Read permission.", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: improper permission checks allow canceling queue items and aborting builds" }, { "cve": "CVE-2021-21671", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007750" } ], "notes": [ { "category": "description", "text": "Session fixation vulnerability was found in Jenkins. The existing session on login process are not invalidated and this allows an attacker to gain potentially additional access on Jenkins by using social engineering attack techniques on a target user.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: session fixation vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21671" }, { "category": "external", "summary": "RHBZ#2007750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21671", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T20:23:34+00:00", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: session fixation vulnerability" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T20:23:34+00:00", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T20:23:34+00:00", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T20:23:34+00:00", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T20:23:34+00:00", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
ghsa-4wr9-2xc6-jmg5
Vulnerability from github
Published
2022-05-24 19:06
Modified
2023-10-27 15:36
Severity ?
Summary
Session fixation vulnerability in Jenkins
Details
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins.
This vulnerability was introduced in Jenkins 2.266 and LTS 2.277.1.
Jenkins 2.300, LTS 2.289.2 invalidates the previous session on login.
In case of problems, administrators can choose a different implementation by setting the Java system property hudson.security.SecurityRealm.sessionFixationProtectionMode
to 2
, or disable the fix entirely by setting that system property to 0
.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 2.299" }, "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.main:jenkins-core" }, "ranges": [ { "events": [ { "introduced": "2.292" }, { "fixed": "2.300" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 2.289.1" }, "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.main:jenkins-core" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.289.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-21671" ], "database_specific": { "cwe_ids": [ "CWE-384" ], "github_reviewed": true, "github_reviewed_at": "2022-12-16T15:20:37Z", "nvd_published_at": "2021-06-30T17:15:00Z", "severity": "HIGH" }, "details": "Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins.\n\nThis vulnerability was introduced in Jenkins 2.266 and LTS 2.277.1.\n\nJenkins 2.300, LTS 2.289.2 invalidates the previous session on login.\n\nIn case of problems, administrators can choose a different implementation by setting the [Java system property `hudson.security.SecurityRealm.sessionFixationProtectionMode`](https://www.jenkins.io/doc/book/managing/system-properties/#hudson-security-securityrealm-sessionfixationprotectionmode) to `2`, or disable the fix entirely by setting that system property to `0`.", "id": "GHSA-4wr9-2xc6-jmg5", "modified": "2023-10-27T15:36:00Z", "published": "2022-05-24T19:06:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671" }, { "type": "WEB", "url": "https://github.com/jenkinsci/jenkins/commit/25a42f3942fd9f8bd768c887c679dbc796b4fcd5" }, { "type": "PACKAGE", "url": "https://github.com/jenkinsci/jenkins" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/06/30/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Session fixation vulnerability in Jenkins" }
gsd-2021-21671
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-21671", "description": "Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.", "id": "GSD-2021-21671", "references": [ "https://access.redhat.com/errata/RHSA-2021:3820", "https://access.redhat.com/errata/RHBA-2021:3396", "https://access.redhat.com/errata/RHBA-2021:3033", "https://security.archlinux.org/CVE-2021-21671" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-21671" ], "details": "Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.", "id": "GSD-2021-21671", "modified": "2023-12-13T01:23:10.716761Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2021-21671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.266", "version_value": "unspecified" }, { "version_affected": "\u003c", "version_name": "LTS 2.277.1", "version_value": "unspecified" }, { "version_affected": "\u003c=", "version_name": "unspecified", "version_value": "2.299" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371", "refsource": "MISC", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" }, { "name": "http://www.openwall.com/lists/oss-security/2021/06/30/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2021/06/30/1" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[2.266,2.300)", "affected_versions": "All versions starting from 2.266 before 2.300", "cvss_v2": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-384", "CWE-937" ], "date": "2021-07-06", "description": "Jenkins does not invalidate the previous session on login.", "fixed_versions": [ "2.300" ], "identifier": "CVE-2021-21671", "identifiers": [ "CVE-2021-21671" ], "not_impacted": "All versions starting from 2.300", "package_slug": "maven/org.jenkins-ci.main/jenkins-core", "pubdate": "2021-06-30", "solution": "Upgrade to version 2.300 or above.", "title": "Session Fixation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-21671", "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" ], "uuid": "370eaf8e-09bb-4f32-9a68-1c6fc9b2fc92" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "2.289.2", "versionStartIncluding": "2.277.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "2.300", "versionStartIncluding": "2.266", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2021-21671" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login." } ] }, "problemtype": { "problemtype_data": [ { "description": [] } ] }, "references": { "reference_data": [ { "name": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" }, { "name": "[oss-security] 20210630 Multiple vulnerabilities in Jenkins and Jenkins plugins", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/06/30/1" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9 } }, "lastModifiedDate": "2023-10-25T18:16Z", "publishedDate": "2021-06-30T17:15Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.