Action not permitted
Modal body text goes here.
CVE-2021-33196
Vulnerability from cvelistv5
Published
2021-08-02 00:00
Modified
2024-08-03 23:42
Severity
Summary
In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic.
References
Source | URL | Tags |
---|---|---|
cve@mitre.org | https://groups.google.com/g/golang-announce | Third Party Advisory |
cve@mitre.org | https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI | Exploit, Patch, Third Party Advisory |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html | Mailing List, Third Party Advisory |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html | Mailing List, Third Party Advisory |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html | |
cve@mitre.org | https://security.gentoo.org/glsa/202208-02 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:20.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/g/golang-announce" }, { "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33196", "datePublished": "2021-08-02T00:00:00", "dateReserved": "2021-05-19T00:00:00", "dateUpdated": "2024-08-03T23:42:20.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-33196\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-08-02T19:15:08.457\",\"lastModified\":\"2023-04-20T00:15:07.147\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic.\"},{\"lang\":\"es\",\"value\":\"En archive/zip en Go versiones anteriores a 1.15.13 y versiones 1.16.x anteriores a 1.16.5, un recuento de archivos crafteado (en la cabecera de un archivo) puede causar un p\u00e1nico en NewReader u OpenReader.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.15.13\",\"matchCriteriaId\":\"83DF0007-D86B-419A-8722-A8C8C3313684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.16.0\",\"versionEndExcluding\":\"1.16.5\",\"matchCriteriaId\":\"DBF475E5-A5BF-49FF-89A3-F7C7E0051E8F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://groups.google.com/g/golang-announce\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2021_3758
Vulnerability from csaf_redhat
Published
2021-10-18 17:45
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.9.0 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.9.0 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.0. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2021:3759
Security Fix(es):
* jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory (CVE-2021-28169)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
* openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action (CVE-2021-36980)
* jetty: SessionListener can prevent a session from being invalidated breaking logout (CVE-2021-34428)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.9.0 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.0. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:3759\n\nSecurity Fix(es):\n\n* jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory (CVE-2021-28169)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\n* openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action (CVE-2021-36980)\n\n* jetty: SessionListener can prevent a session from being invalidated breaking logout (CVE-2021-34428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3758", "url": "https://access.redhat.com/errata/RHSA-2021:3758" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1971016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971016" }, { "category": "external", "summary": "1974891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974891" }, { "category": "external", "summary": "1984473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984473" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3758.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.0 packages and security update", "tracking": { "current_release_date": "2024-09-18T04:19:51+00:00", "generator": { "date": "2024-09-18T04:19:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3758", "initial_release_date": "2021-10-18T17:45:30+00:00", "revision_history": [ { "date": "2021-10-18T17:45:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-10-18T17:45:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el7.src", "product": { "name": "cri-tools-0:1.22.0-2.el7.src", "product_id": "cri-tools-0:1.22.0-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el7?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "product": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "product_id": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.1-2.rhaos4.9.git4144b63.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "product": { "name": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "product_id": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.0-88.rhaos4.9.gitbdf286c.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "product": { "name": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "product_id": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "product": { "name": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "product_id": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.167.0-1.module%2Bel8.5.0%2B12397%2Bbf23b712?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "product_id": "jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1630555871-1.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.289.3.1630554997-1.el8.src", "product": { "name": "jenkins-0:2.289.3.1630554997-1.el8.src", "product_id": "jenkins-0:2.289.3.1630554997-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.3.1630554997-1.el8?arch=src" } } }, { "category": "product_version", "name": "ironic-images-0:2021.2-20210827.1.el8.src", "product": { "name": "ironic-images-0:2021.2-20210827.1.el8.src", "product_id": "ironic-images-0:2021.2-20210827.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images@2021.2-20210827.1.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "product": { "name": "openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "product_id": "openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic@18.1.1-0.20210812092216.4aec741.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "product": { "name": "rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "product_id": "rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn@5.1.0-1.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-1.rhaos4.9.el8.src", "product": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.src", "product_id": "ignition-0:2.12.0-1.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-1.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-1.el8.src", "product": { "name": "cri-tools-0:1.22.0-1.el8.src", "product_id": "cri-tools-0:1.22.0-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-1.el8?arch=src" } } }, { "category": "product_version", "name": "butane-0:0.13.1-1.rhaos4.9.el8.src", "product": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.src", "product_id": "butane-0:0.13.1-1.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-1.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "product": { "name": "python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "product_id": "python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy@3.11.0-0.20210802160404.b93dcba.el8?arch=src" } } }, { "category": "product_version", "name": "kata-containers-0:2.1.0-6.el8.src", "product": { "name": "kata-containers-0:2.1.0-6.el8.src", "product_id": "kata-containers-0:2.1.0-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.1.0-6.el8?arch=src" } } }, { "category": "product_version", "name": "rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "product": { "name": "rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "product_id": "rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd@0.2.5-3.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-3.rhaos4.9.el8.src", "product": { "name": "toolbox-0:0.0.8-3.rhaos4.9.el8.src", "product_id": "toolbox-0:0.0.8-3.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-3.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "python-pycdlib-0:1.11.0-3.el8.src", "product": { "name": "python-pycdlib-0:1.11.0-3.el8.src", "product_id": "python-pycdlib-0:1.11.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pycdlib@1.11.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "product": { "name": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "product_id": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.7.1-0.20210722154052.edf655c.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "product": { "name": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "product_id": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@8.1.1-0.20210722155129.7f3de67.el8?arch=src" } } }, { "category": "product_version", "name": "openvswitch2.15-0:2.15.0-28.el8fdp.src", "product": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.src", "product_id": "openvswitch2.15-0:2.15.0-28.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15@2.15.0-28.el8fdp?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "product": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "product_id": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.1-2.rhaos4.9.git4144b63.el8?arch=src" } } }, { "category": "product_version", "name": "python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "product": { "name": "python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "product_id": "python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-hardware@0.28.0-0.20210719162211.96c9863.el8?arch=src" } } }, { "category": "product_version", "name": "python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "product": { "name": "python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "product_id": "python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-scciclient@0.9.1-0.20210720102209.34ccd96.el8?arch=src" } } }, { "category": "product_version", "name": "haproxy-0:2.2.15-1.el8.src", "product": { "name": "haproxy-0:2.2.15-1.el8.src", "product_id": "haproxy-0:2.2.15-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy@2.2.15-1.el8?arch=src" } } }, { "category": "product_version", "name": "python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "product": { "name": "python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "product_id": "python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ironicclient@4.7.1-0.20210611202214.3d146fb.el8?arch=src" } } }, { "category": "product_version", "name": "python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "product": { "name": "python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "product_id": "python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ironic-prometheus-exporter@2.3.0-0.20210611093526.3c9b517.el8?arch=src" } } }, { "category": "product_version", "name": "python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "product": { "name": "python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "product_id": "python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ironic-lib@4.7.2-0.20210707162243.d33cf3e.el8?arch=src" } } }, { "category": "product_version", "name": "python-eventlet-0:0.30.2-1.el8.src", "product": { "name": "python-eventlet-0:0.30.2-1.el8.src", "product_id": "python-eventlet-0:0.30.2-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-eventlet@0.30.2-1.el8?arch=src" } } }, { "category": "product_version", "name": "python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "product": { "name": "python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "product_id": "python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-dracclient@5.1.1-0.20210318155434.98c7ea3.el8?arch=src" } } }, { "category": "product_version", "name": "python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "product": { "name": "python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "product_id": "python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-osc-lib@2.3.1-0.20210318171847.2b7a679.el8?arch=src" } } }, { "category": "product_version", "name": "python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "product": { "name": "python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "product_id": "python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-dogpile-cache@1.1.2-1.el8ost.1?arch=src" } } }, { "category": "product_version", "name": "python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "product": { "name": "python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "product_id": "python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cliff@3.7.0-0.20210318182629.117a100.el8?arch=src" } } }, { "category": "product_version", "name": "python-cmd2-0:1.4.0-1.1.el8.src", "product": { "name": "python-cmd2-0:1.4.0-1.1.el8.src", "product_id": "python-cmd2-0:1.4.0-1.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cmd2@1.4.0-1.1.el8?arch=src" } } }, { "category": "product_version", "name": "python-wcwidth-0:0.1.7-14.el8ost.src", "product": { "name": "python-wcwidth-0:0.1.7-14.el8ost.src", "product_id": "python-wcwidth-0:0.1.7-14.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wcwidth@0.1.7-14.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-pyperclip-0:1.6.4-6.el8ost.src", "product": { "name": "python-pyperclip-0:1.6.4-6.el8ost.src", "product_id": "python-pyperclip-0:1.6.4-6.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyperclip@1.6.4-6.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "product": { "name": "python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "product_id": "python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy-oem-idrac@2.0.1-0.20210326153413.83b7eb0.el8?arch=src" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "product": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "product_id": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.3-1.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:49.84-2.el8.src", "product": { "name": "redhat-release-coreos-0:49.84-2.el8.src", "product_id": "redhat-release-coreos-0:49.84-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@49.84-2.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "product_id": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "product": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "product_id": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.10.0-2.rhaos4.9.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "product": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "product_id": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "product": { "name": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "product_id": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openvswitch2.16-0:2.16.0-15.el8fdp.src", "product": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.src", "product_id": "openvswitch2.16-0:2.16.0-15.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16@2.16.0-15.el8fdp?arch=src" } } }, { "category": "product_version", "name": "ovn21.09-0:21.09.0-20.el8fdp.src", "product": { "name": "ovn21.09-0:21.09.0-20.el8fdp.src", "product_id": "ovn21.09-0:21.09.0-20.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09@21.09.0-20.el8fdp?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cri-tools-0:1.22.0-2.el7.x86_64", "product": { "name": "cri-tools-0:1.22.0-2.el7.x86_64", "product_id": "cri-tools-0:1.22.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "product": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "product_id": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.1-2.rhaos4.9.git4144b63.el7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "product": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "product_id": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.1-2.rhaos4.9.git4144b63.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "product": { "name": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "product_id": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.0-88.rhaos4.9.gitbdf286c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.0-88.rhaos4.9.gitbdf286c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "product": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "product_id": "afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.1.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "product": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "product_id": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.1.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "product": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "product_id": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.1.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "product": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_id": "ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "product": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_id": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_id": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_id": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-1.el8.x86_64", "product": { "name": "cri-tools-0:1.22.0-1.el8.x86_64", "product_id": "cri-tools-0:1.22.0-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "product": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "product_id": "butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "product": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "product_id": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "product": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "product_id": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-1.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kata-containers-0:2.1.0-6.el8.x86_64", "product": { "name": "kata-containers-0:2.1.0-6.el8.x86_64", "product_id": "kata-containers-0:2.1.0-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.1.0-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "product": { "name": "bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "product_id": "bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd@0.2.5-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "product": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "product_id": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd-debugsource@0.2.5-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "product": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "product_id": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd-debuginfo@0.2.5-3.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product_id": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.15@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product_id": "openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "product_id": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-devel@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "product_id": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-ipsec@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product_id": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "product_id": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debugsource@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "product_id": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "product_id": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product_id": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.1-2.rhaos4.9.git4144b63.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product_id": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.1-2.rhaos4.9.git4144b63.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product_id": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.1-2.rhaos4.9.git4144b63.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.15-1.el8.x86_64", "product": { "name": "haproxy-debugsource-0:2.2.15-1.el8.x86_64", "product_id": "haproxy-debugsource-0:2.2.15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:49.84-2.el8.x86_64", "product": { "name": "redhat-release-coreos-0:49.84-2.el8.x86_64", "product_id": "redhat-release-coreos-0:49.84-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@49.84-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "product": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_id": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.10.0-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "product": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_id": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.10.0-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.10.0-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "product": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_id": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.10.0-2.rhaos4.9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product_id": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product_id": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product_id": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.16@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product_id": "openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "product_id": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-devel@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "product_id": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-ipsec@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product_id": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "product_id": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debugsource@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "product_id": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "product_id": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debugsource@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central-debuginfo@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debuginfo@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host-debuginfo@21.09.0-20.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_id": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep-debuginfo@21.09.0-20.el8fdp?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "product": { "name": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "product_id": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.167.0-1.module%2Bel8.5.0%2B12397%2Bbf23b712?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.9.1630555871-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.289.3.1630554997-1.el8.noarch", "product": { "name": "jenkins-0:2.289.3.1630554997-1.el8.noarch", "product_id": "jenkins-0:2.289.3.1630554997-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.3.1630554997-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "product": { "name": "ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "product_id": "ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images-ipa-ppc64le@2021.2-20210827.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "ironic-images-0:2021.2-20210827.1.el8.noarch", "product": { "name": "ironic-images-0:2021.2-20210827.1.el8.noarch", "product_id": "ironic-images-0:2021.2-20210827.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images@2021.2-20210827.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "ironic-images-all-0:2021.2-20210827.1.el8.noarch", "product": { "name": "ironic-images-all-0:2021.2-20210827.1.el8.noarch", "product_id": "ironic-images-all-0:2021.2-20210827.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images-all@2021.2-20210827.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "product": { "name": "ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "product_id": "ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images-ipa-x86_64@2021.2-20210827.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product": { "name": "openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_id": "openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-api@18.1.1-0.20210812092216.4aec741.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product": { "name": "openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_id": "openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-common@18.1.1-0.20210812092216.4aec741.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product": { "name": "openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_id": "openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-conductor@18.1.1-0.20210812092216.4aec741.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product": { "name": "python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_id": "python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-tests@18.1.1-0.20210812092216.4aec741.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "product": { "name": "butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "product_id": "butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-redistributable@0.13.1-1.rhaos4.9.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "product": { "name": "python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "product_id": "python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy@3.11.0-0.20210802160404.b93dcba.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "product": { "name": "python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "product_id": "python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-tests@3.11.0-0.20210802160404.b93dcba.el8?arch=noarch" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "product": { "name": "toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "product_id": "toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-3.rhaos4.9.el8?arch=noarch" } } }, { "category": "product_version", "name": "pycdlib-tools-0:1.11.0-3.el8.noarch", "product": { "name": "pycdlib-tools-0:1.11.0-3.el8.noarch", "product_id": "pycdlib-tools-0:1.11.0-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pycdlib-tools@1.11.0-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pycdlib-0:1.11.0-3.el8.noarch", "product": { "name": "python3-pycdlib-0:1.11.0-3.el8.noarch", "product_id": "python3-pycdlib-0:1.11.0-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pycdlib@1.11.0-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product": { "name": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_id": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.7.1-0.20210722154052.edf655c.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product": { "name": "openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_id": "openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-api@10.7.1-0.20210722154052.edf655c.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product": { "name": "openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_id": "openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-conductor@10.7.1-0.20210722154052.edf655c.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product": { "name": "openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_id": "openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-dnsmasq@10.7.1-0.20210722154052.edf655c.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product": { "name": "python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_id": "python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-inspector-tests@10.7.1-0.20210722154052.edf655c.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "product": { "name": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "product_id": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@8.1.1-0.20210722155129.7f3de67.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "product": { "name": "python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "product_id": "python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-python-agent@8.1.1-0.20210722155129.7f3de67.el8?arch=noarch" } } }, { "category": "product_version", "name": "openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "product": { "name": "openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "product_id": "openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-test@2.15.0-28.el8fdp?arch=noarch" } } }, { "category": "product_version", "name": "python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "product": { "name": "python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "product_id": "python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-hardware@0.28.0-0.20210719162211.96c9863.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "product": { "name": "python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "product_id": "python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-hardware-detect@0.28.0-0.20210719162211.96c9863.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "product": { "name": "python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "product_id": "python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-scciclient@0.9.1-0.20210720102209.34ccd96.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "product": { "name": "python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "product_id": "python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironicclient@4.7.1-0.20210611202214.3d146fb.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "product": { "name": "python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "product_id": "python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-prometheus-exporter@2.3.0-0.20210611093526.3c9b517.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "product": { "name": "python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "product_id": "python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-lib@4.7.2-0.20210707162243.d33cf3e.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-eventlet-0:0.30.2-1.el8.noarch", "product": { "name": "python3-eventlet-0:0.30.2-1.el8.noarch", "product_id": "python3-eventlet-0:0.30.2-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-eventlet@0.30.2-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "product": { "name": "python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "product_id": "python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-dracclient@5.1.1-0.20210318155434.98c7ea3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "product": { "name": "python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "product_id": "python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-osc-lib@2.3.1-0.20210318171847.2b7a679.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "product": { "name": "python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "product_id": "python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-osc-lib-tests@2.3.1-0.20210318171847.2b7a679.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "product": { "name": "python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "product_id": "python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-dogpile-cache@1.1.2-1.el8ost.1?arch=noarch" } } }, { "category": "product_version", "name": "python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "product": { "name": "python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "product_id": "python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cliff@3.7.0-0.20210318182629.117a100.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "product": { "name": "python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "product_id": "python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cliff-tests@3.7.0-0.20210318182629.117a100.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-cmd2-0:1.4.0-1.1.el8.noarch", "product": { "name": "python3-cmd2-0:1.4.0-1.1.el8.noarch", "product_id": "python3-cmd2-0:1.4.0-1.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cmd2@1.4.0-1.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-wcwidth-0:0.1.7-14.el8ost.noarch", "product": { "name": "python3-wcwidth-0:0.1.7-14.el8ost.noarch", "product_id": "python3-wcwidth-0:0.1.7-14.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-wcwidth@0.1.7-14.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "product": { "name": "python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "product_id": "python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyperclip-doc@1.6.4-6.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-pyperclip-0:1.6.4-6.el8ost.noarch", "product": { "name": "python3-pyperclip-0:1.6.4-6.el8ost.noarch", "product_id": "python3-pyperclip-0:1.6.4-6.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyperclip@1.6.4-6.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "product": { "name": "python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "product_id": "python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac@2.0.1-0.20210326153413.83b7eb0.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "product": { "name": "python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "product_id": "python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac-tests@2.0.1-0.20210326153413.83b7eb0.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "product": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "product_id": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.3-1.rhaos4.9.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "product": { "name": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "product_id": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.20.3-1.rhaos4.9.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "product": { "name": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "product_id": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.20.3-1.rhaos4.9.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "product": { "name": "openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "product_id": "openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-test@2.16.0-15.el8fdp?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "product": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "product_id": "afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.1.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "product": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "product_id": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.1.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "product": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "product_id": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.1.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "product": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_id": "ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "product": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_id": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "product": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_id": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "product": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_id": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_id": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-1.el8.aarch64", "product": { "name": "cri-tools-0:1.22.0-1.el8.aarch64", "product_id": "cri-tools-0:1.22.0-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "product": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "product_id": "cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "product": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "product_id": "cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "product": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "product_id": "butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "product": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "product_id": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "product": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "product_id": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-1.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kata-containers-0:2.1.0-6.el8.aarch64", "product": { "name": "kata-containers-0:2.1.0-6.el8.aarch64", "product_id": "kata-containers-0:2.1.0-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.1.0-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "product": { "name": "bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "product_id": "bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd@0.2.5-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "product": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "product_id": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd-debugsource@0.2.5-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "product": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "product_id": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd-debuginfo@0.2.5-3.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product_id": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.15@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product_id": "openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "product_id": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-devel@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "product_id": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-ipsec@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product_id": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "product_id": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debugsource@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "product_id": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "product": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "product_id": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product_id": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.1-2.rhaos4.9.git4144b63.el8?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product_id": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.1-2.rhaos4.9.git4144b63.el8?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product_id": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.1-2.rhaos4.9.git4144b63.el8?arch=aarch64" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.15-1.el8.aarch64", "product": { "name": "haproxy-debugsource-0:2.2.15-1.el8.aarch64", "product_id": "haproxy-debugsource-0:2.2.15-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.15-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:49.84-2.el8.aarch64", "product": { "name": "redhat-release-coreos-0:49.84-2.el8.aarch64", "product_id": "redhat-release-coreos-0:49.84-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@49.84-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "product": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "product_id": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "product": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "product_id": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "product": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_id": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.10.0-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "product": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_id": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.10.0-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.10.0-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "product": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_id": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.10.0-2.rhaos4.9.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product_id": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product_id": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product_id": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "product": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "product_id": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product_id": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.16@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product_id": "openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "product_id": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-devel@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "product_id": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-ipsec@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product_id": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "product_id": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debugsource@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "product_id": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "product": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "product_id": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debugsource@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central-debuginfo@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debuginfo@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host-debuginfo@21.09.0-20.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_id": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep-debuginfo@21.09.0-20.el8fdp?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product_id": "afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.1.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product_id": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.1.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product_id": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.1.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_id": "ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_id": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_id": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-1.el8.ppc64le", "product": { "name": "cri-tools-0:1.22.0-1.el8.ppc64le", "product_id": "cri-tools-0:1.22.0-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product_id": "butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product_id": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product_id": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-1.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kata-containers-0:2.1.0-6.el8.ppc64le", "product": { "name": "kata-containers-0:2.1.0-6.el8.ppc64le", "product_id": "kata-containers-0:2.1.0-6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.1.0-6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product_id": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.15@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product_id": "openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "product_id": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-devel@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "product_id": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-ipsec@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product_id": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "product_id": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debugsource@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "product_id": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "product_id": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product_id": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.1-2.rhaos4.9.git4144b63.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product_id": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.1-2.rhaos4.9.git4144b63.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product_id": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.1-2.rhaos4.9.git4144b63.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "product": { "name": "haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "product_id": "haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:49.84-2.el8.ppc64le", "product": { "name": "redhat-release-coreos-0:49.84-2.el8.ppc64le", "product_id": "redhat-release-coreos-0:49.84-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@49.84-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_id": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.10.0-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_id": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.10.0-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_id": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.10.0-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.10.0-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_id": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.10.0-2.rhaos4.9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product_id": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product_id": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.16@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product_id": "openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "product_id": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-devel@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "product_id": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-ipsec@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product_id": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "product_id": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debugsource@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "product_id": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "product_id": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debugsource@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central-debuginfo@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debuginfo@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host-debuginfo@21.09.0-20.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_id": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep-debuginfo@21.09.0-20.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "product": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "product_id": "afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.1.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "product": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "product_id": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.1.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "product": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "product_id": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.1.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "product": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "product_id": "ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.12.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "product": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "product_id": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.12.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "product": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "product_id": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.12.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "product_id": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.12.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.12.0-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.22.0-1.el8.s390x", "product": { "name": "cri-tools-0:1.22.0-1.el8.s390x", "product_id": "cri-tools-0:1.22.0-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.22.0-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.22.0-1.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.s390x", "product_id": "cri-tools-debugsource-0:1.22.0-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.22.0-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.22.0-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-0:0.13.1-1.rhaos4.9.el8.s390x", "product": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.s390x", "product_id": "butane-0:0.13.1-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.13.1-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "product": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "product_id": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.13.1-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "product": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "product_id": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.13.1-1.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product_id": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.15@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product_id": "openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "product": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "product_id": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-devel@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "product": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "product_id": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-ipsec@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product_id": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "product": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "product_id": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debugsource@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "product": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "product_id": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "product": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "product_id": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.15-debuginfo@2.15.0-28.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product_id": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.1-2.rhaos4.9.git4144b63.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product_id": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.1-2.rhaos4.9.git4144b63.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product_id": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.1-2.rhaos4.9.git4144b63.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.15-1.el8.s390x", "product": { "name": "haproxy-debugsource-0:2.2.15-1.el8.s390x", "product_id": "haproxy-debugsource-0:2.2.15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:49.84-2.el8.s390x", "product": { "name": "redhat-release-coreos-0:49.84-2.el8.s390x", "product_id": "redhat-release-coreos-0:49.84-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@49.84-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "product": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "product_id": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.10.0-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "product": { "name": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "product_id": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.10.0-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "product": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "product_id": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.10.0-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.10.0-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "product": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "product_id": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.10.0-2.rhaos4.9.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product_id": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product_id": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product_id": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.22.0-73.rhaos4.9.gitbdf286c.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product_id": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.16@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product_id": "openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "product": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "product_id": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-devel@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "product": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "product_id": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-ipsec@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product_id": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "product": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "product_id": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debugsource@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "product": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "product_id": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "product": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "product_id": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.16-debuginfo@2.16.0-15.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debugsource@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-central-debuginfo@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-debuginfo@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-host-debuginfo@21.09.0-20.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "product": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_id": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn21.09-vtep-debuginfo@21.09.0-20.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src" }, "product_reference": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64" }, "product_reference": "cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src" }, "product_reference": "cri-tools-0:1.22.0-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64" }, "product_reference": "cri-tools-0:1.22.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src" }, "product_reference": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64" }, "product_reference": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x" }, "product_reference": "afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x" }, "product_reference": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64" }, "product_reference": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64" }, "product_reference": "bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64" }, "product_reference": "bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64" }, "product_reference": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64" }, "product_reference": "bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64" }, "product_reference": "butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x" }, "product_reference": "butane-0:0.13.1-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src" }, "product_reference": "butane-0:0.13.1-1.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.13.1-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64" }, "product_reference": "butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64" }, "product_reference": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x" }, "product_reference": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64" }, "product_reference": "butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64" }, "product_reference": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le" }, "product_reference": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x" }, "product_reference": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64" }, "product_reference": "butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch" }, "product_reference": "butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch" }, "product_reference": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src" }, "product_reference": "console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch" }, "product_reference": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch" }, "product_reference": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch" }, "product_reference": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src" }, "product_reference": "container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64" }, "product_reference": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le" }, "product_reference": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x" }, "product_reference": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src" }, "product_reference": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64" }, "product_reference": "coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64" }, "product_reference": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le" }, "product_reference": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x" }, "product_reference": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64" }, "product_reference": "coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64" }, "product_reference": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le" }, "product_reference": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x" }, "product_reference": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64" }, "product_reference": "coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64" }, "product_reference": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le" }, "product_reference": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x" }, "product_reference": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src" }, "product_reference": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64" }, "product_reference": "cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64" }, "product_reference": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64" }, "product_reference": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64" }, "product_reference": "cri-tools-0:1.22.0-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le" }, "product_reference": "cri-tools-0:1.22.0-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x" }, "product_reference": "cri-tools-0:1.22.0-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src" }, "product_reference": "cri-tools-0:1.22.0-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.22.0-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64" }, "product_reference": "cri-tools-0:1.22.0-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.22.0-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64" }, "product_reference": "cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.22.0-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.22.0-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-0:2.2.15-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src" }, "product_reference": "haproxy-0:2.2.15-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.15-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64" }, "product_reference": "haproxy-debugsource-0:2.2.15-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le" }, "product_reference": "haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x" }, "product_reference": "haproxy-debugsource-0:2.2.15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64" }, "product_reference": "haproxy-debugsource-0:2.2.15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x" }, "product_reference": "ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src" }, "product_reference": "ignition-0:2.12.0-1.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.12.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x" }, "product_reference": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-0:2021.2-20210827.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch" }, "product_reference": "ironic-images-0:2021.2-20210827.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-0:2021.2-20210827.1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src" }, "product_reference": "ironic-images-0:2021.2-20210827.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-all-0:2021.2-20210827.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch" }, "product_reference": "ironic-images-all-0:2021.2-20210827.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch" }, "product_reference": "ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch" }, "product_reference": "ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.3.1630554997-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch" }, "product_reference": "jenkins-0:2.289.3.1630554997-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.3.1630554997-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src" }, "product_reference": "jenkins-0:2.289.3.1630554997-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.9.1630555871-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.1.0-6.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64" }, "product_reference": "kata-containers-0:2.1.0-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.1.0-6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le" }, "product_reference": "kata-containers-0:2.1.0-6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.1.0-6.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src" }, "product_reference": "kata-containers-0:2.1.0-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.1.0-6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64" }, "product_reference": "kata-containers-0:2.1.0-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64" }, "product_reference": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src" }, "product_reference": "openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch" }, "product_reference": "openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch" }, "product_reference": "openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch" }, "product_reference": "openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch" }, "product_reference": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src" }, "product_reference": "openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch" }, "product_reference": "openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch" }, "product_reference": "openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch" }, "product_reference": "openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch" }, "product_reference": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src" }, "product_reference": "openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src" }, "product_reference": "openvswitch2.15-0:2.15.0-28.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch" }, "product_reference": "openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src" }, "product_reference": "openvswitch2.16-0:2.16.0-15.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch" }, "product_reference": "openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-0:21.09.0-20.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src" }, "product_reference": "ovn21.09-0:21.09.0-20.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64" }, "product_reference": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le" }, "product_reference": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x" }, "product_reference": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64" }, "product_reference": "ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "pycdlib-tools-0:1.11.0-3.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch" }, "product_reference": "pycdlib-tools-0:1.11.0-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src" }, "product_reference": "python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-cmd2-0:1.4.0-1.1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src" }, "product_reference": "python-cmd2-0:1.4.0-1.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-dogpile-cache-0:1.1.2-1.el8ost.1.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src" }, "product_reference": "python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src" }, "product_reference": "python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-eventlet-0:0.30.2-1.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src" }, "product_reference": "python-eventlet-0:0.30.2-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src" }, "product_reference": "python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src" }, "product_reference": "python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src" }, "product_reference": "python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src" }, "product_reference": "python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src" }, "product_reference": "python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-pycdlib-0:1.11.0-3.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src" }, "product_reference": "python-pycdlib-0:1.11.0-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyperclip-0:1.6.4-6.el8ost.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src" }, "product_reference": "python-pyperclip-0:1.6.4-6.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyperclip-doc-0:1.6.4-6.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch" }, "product_reference": "python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src" }, "product_reference": "python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src" }, "product_reference": "python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src" }, "product_reference": "python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-wcwidth-0:0.1.7-14.el8ost.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src" }, "product_reference": "python-wcwidth-0:0.1.7-14.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch" }, "product_reference": "python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch" }, "product_reference": "python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cmd2-0:1.4.0-1.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch" }, "product_reference": "python3-cmd2-0:1.4.0-1.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch" }, "product_reference": "python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch" }, "product_reference": "python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-eventlet-0:0.30.2-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch" }, "product_reference": "python3-eventlet-0:0.30.2-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch" }, "product_reference": "python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch" }, "product_reference": "python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch" }, "product_reference": "python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch" }, "product_reference": "python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch" }, "product_reference": "python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch" }, "product_reference": "python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch" }, "product_reference": "python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch" }, "product_reference": "python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64" }, "product_reference": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64" }, "product_reference": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch" }, "product_reference": "python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch" }, "product_reference": "python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pycdlib-0:1.11.0-3.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch" }, "product_reference": "python3-pycdlib-0:1.11.0-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyperclip-0:1.6.4-6.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch" }, "product_reference": "python3-pyperclip-0:1.6.4-6.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch" }, "product_reference": "python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch" }, "product_reference": "python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch" }, "product_reference": "python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch" }, "product_reference": "python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch" }, "product_reference": "python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "python3-wcwidth-0:0.1.7-14.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch" }, "product_reference": "python3-wcwidth-0:0.1.7-14.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:49.84-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64" }, "product_reference": "redhat-release-coreos-0:49.84-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:49.84-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le" }, "product_reference": "redhat-release-coreos-0:49.84-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:49.84-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x" }, "product_reference": "redhat-release-coreos-0:49.84-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:49.84-2.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src" }, "product_reference": "redhat-release-coreos-0:49.84-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:49.84-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64" }, "product_reference": "redhat-release-coreos-0:49.84-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64" }, "product_reference": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le" }, "product_reference": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x" }, "product_reference": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src" }, "product_reference": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64" }, "product_reference": "runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x" }, "product_reference": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64" }, "product_reference": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x" }, "product_reference": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64" }, "product_reference": "runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src" }, "product_reference": "rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64" }, "product_reference": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le" }, "product_reference": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x" }, "product_reference": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64" }, "product_reference": "rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src" }, "product_reference": "rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64" }, "product_reference": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64" }, "product_reference": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-3.rhaos4.9.el8.noarch as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch" }, "product_reference": "toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-3.rhaos4.9.el8.src as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" }, "product_reference": "toolbox-0:0.0.8-3.rhaos4.9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3917", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "discovery_date": "2021-10-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018478" } ], "notes": [ { "category": "description", "text": "A flaw was found in the coreos-installer, where it writes the Ignition config to the target system with world-readable access permissions. This flaw allows a local attacker to have read access to potentially sensitive data. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "coreos-installer: restrict access permissions on /boot/ignition{,/config.ign}", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3917" }, { "category": "external", "summary": "RHBZ#2018478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3917", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3917" }, { "category": "external", "summary": "https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c", "url": "https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c" } ], "release_date": "2021-07-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "coreos-installer: restrict access permissions on /boot/ignition{,/config.ign}" }, { "cve": "CVE-2021-28169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1971016" } ], "notes": [ { "category": "description", "text": "For Eclipse Jetty versions \u003c= 9.4.40, \u003c= 10.0.2, \u003c= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the hive/presto/hadoop components that comprise the OCP metering stack, ship the vulnerable version of jetty.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated\n\nRed Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.\n\nRed Hat CodeReady Studio 12 is not affected by this flaw because it does not ship the vulnerable components (ConcatServlet or WelcomeFilter) of jetty.\n\nRed Hat Enterprise Linux 8 is not affected by this flaw because it does not ship the vulnerable components (ConcatServlet or WelcomeFilter) of jetty.\n\nRed Hat Enterprise Linux 7 ships the vulnerable component of jetty, but only in the optional repository and thus this flaw is out of support scope for Red Hat Enterprise Linux 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28169" }, { "category": "external", "summary": "RHBZ#1971016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28169" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-34428", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "discovery_date": "2021-06-22T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974891" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the jetty-server, where if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts, this could result in a session not being invalidated and a shared-computer application being left logged in. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: SessionListener can prevent a session from being invalidated breaking logout", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the hive/presto/hadoop components that comprise the OCP metering stack, ship the vulnerable version of jetty. Since the release of OCP 4.6, the metering product has been deprecated [1], hence the affected components are marked as wontfix. This may be fixed in the future.\n\nOCP 3.11 is out of the support scope for Moderate and Low impact vulnerabilities because is already in the Maintenance Support phase, hence the affected OCP 3.11 component has been marked as wontifx.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34428" }, { "category": "external", "summary": "RHBZ#1974891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34428" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6" } ], "release_date": "2021-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3758" }, { "category": "workaround", "details": "Applications should catch all Throwables within their SessionListener#sessionDestroyed() implementations.", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: SessionListener can prevent a session from being invalidated breaking logout" }, { "cve": "CVE-2021-36980", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1984473" } ], "notes": [ { "category": "description", "text": "Open vSwitch (aka openvswitch) has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.src", "7Server-RH7-RHOSE-4.9:cri-o-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-88.rhaos4.9.gitbdf286c.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.src", "7Server-RH7-RHOSE-4.9:cri-tools-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-2.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-ansible-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-ansible-test-0:4.9.0-202109101042.p0.git.4d833d3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.src", "7Server-RH7-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "7Server-RH7-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el7.x86_64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:afterburn-debuginfo-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.9:atomic-openshift-service-idler-0:4.9.0-202109101042.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:bootupd-debuginfo-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:butane-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debuginfo-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:butane-debugsource-0:0.13.1-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:butane-redistributable-0:0.13.1-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-0:0.20.3-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.noarch", "8Base-RHOSE-4.9:container-selinux-2:2.167.0-1.module+el8.5.0+12397+bf23b712.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.src", "8Base-RHOSE-4.9:coreos-installer-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-bootinfra-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debuginfo-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:coreos-installer-debugsource-0:0.10.0-2.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.src", "8Base-RHOSE-4.9:cri-o-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debuginfo-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.aarch64", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.ppc64le", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.s390x", "8Base-RHOSE-4.9:cri-o-debugsource-0:1.22.0-73.rhaos4.9.gitbdf286c.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.src", "8Base-RHOSE-4.9:cri-tools-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debuginfo-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.aarch64", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.ppc64le", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.s390x", "8Base-RHOSE-4.9:cri-tools-debugsource-0:1.22.0-1.el8.x86_64", "8Base-RHOSE-4.9:haproxy-0:2.2.15-1.el8.src", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.aarch64", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.ppc64le", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.s390x", "8Base-RHOSE-4.9:haproxy-debugsource-0:2.2.15-1.el8.x86_64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:ignition-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-debugsource-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:ignition-validate-debuginfo-0:2.12.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-0:2021.2-20210827.1.el8.src", "8Base-RHOSE-4.9:ironic-images-all-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-ppc64le-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:ironic-images-ipa-x86_64-0:2021.2-20210827.1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-0:2.289.3.1630554997-1.el8.src", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.noarch", "8Base-RHOSE-4.9:jenkins-2-plugins-0:4.9.1630555871-1.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.aarch64", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.ppc64le", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.src", "8Base-RHOSE-4.9:kata-containers-0:2.1.0-6.el8.x86_64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openshift-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-clients-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-clients-redistributable-0:4.9.0-202109101042.p0.git.96e95ce.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.s390x", "8Base-RHOSE-4.9:openshift-hyperkube-0:4.9.0-202110080828.p0.git.894a78b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.9:openshift-kuryr-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.src", "8Base-RHOSE-4.9:openshift-kuryr-cni-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-common-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openshift-kuryr-controller-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-1:18.1.1-0.20210812092216.4aec741.el8.src", "8Base-RHOSE-4.9:openstack-ironic-api-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-common-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-conductor-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-0:10.7.1-0.20210722154052.edf655c.el8.src", "8Base-RHOSE-4.9:openstack-ironic-inspector-api-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-conductor-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-inspector-dnsmasq-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:openstack-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-debugsource-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-devel-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.16-ipsec-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.16-test-0:2.16.0-15.el8fdp.noarch", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.src", "8Base-RHOSE-4.9:ovn21.09-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-central-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-debugsource-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-host-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.aarch64", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.ppc64le", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.s390x", "8Base-RHOSE-4.9:ovn21.09-vtep-debuginfo-0:21.09.0-20.el8fdp.x86_64", "8Base-RHOSE-4.9:pycdlib-tools-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python-cliff-0:3.7.0-0.20210318182629.117a100.el8.src", "8Base-RHOSE-4.9:python-cmd2-0:1.4.0-1.1.el8.src", "8Base-RHOSE-4.9:python-dogpile-cache-0:1.1.2-1.el8ost.1.src", "8Base-RHOSE-4.9:python-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.src", "8Base-RHOSE-4.9:python-eventlet-0:0.30.2-1.el8.src", "8Base-RHOSE-4.9:python-hardware-0:0.28.0-0.20210719162211.96c9863.el8.src", "8Base-RHOSE-4.9:python-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.src", "8Base-RHOSE-4.9:python-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.src", "8Base-RHOSE-4.9:python-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.src", "8Base-RHOSE-4.9:python-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.src", "8Base-RHOSE-4.9:python-pycdlib-0:1.11.0-3.el8.src", "8Base-RHOSE-4.9:python-pyperclip-0:1.6.4-6.el8ost.src", "8Base-RHOSE-4.9:python-pyperclip-doc-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.src", "8Base-RHOSE-4.9:python-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.src", "8Base-RHOSE-4.9:python-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.src", "8Base-RHOSE-4.9:python-wcwidth-0:0.1.7-14.el8ost.src", "8Base-RHOSE-4.9:python3-cliff-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cliff-tests-0:3.7.0-0.20210318182629.117a100.el8.noarch", "8Base-RHOSE-4.9:python3-cmd2-0:1.4.0-1.1.el8.noarch", "8Base-RHOSE-4.9:python3-dogpile-cache-0:1.1.2-1.el8ost.1.noarch", "8Base-RHOSE-4.9:python3-dracclient-0:5.1.1-0.20210318155434.98c7ea3.el8.noarch", "8Base-RHOSE-4.9:python3-eventlet-0:0.30.2-1.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-hardware-detect-0:0.28.0-0.20210719162211.96c9863.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-inspector-tests-0:10.7.1-0.20210722154052.edf655c.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-lib-0:4.7.2-0.20210707162243.d33cf3e.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-prometheus-exporter-0:2.3.0-0.20210611093526.3c9b517.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-python-agent-0:8.1.1-0.20210722155129.7f3de67.el8.noarch", "8Base-RHOSE-4.9:python3-ironic-tests-1:18.1.1-0.20210812092216.4aec741.el8.noarch", "8Base-RHOSE-4.9:python3-ironicclient-0:4.7.1-0.20210611202214.3d146fb.el8.noarch", "8Base-RHOSE-4.9:python3-kuryr-kubernetes-0:4.9.0-202109101042.p0.git.e66f211.assembly.stream.el8.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.16-debuginfo-0:2.16.0-15.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-osc-lib-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-osc-lib-tests-0:2.3.1-0.20210318171847.2b7a679.el8.noarch", "8Base-RHOSE-4.9:python3-pycdlib-0:1.11.0-3.el8.noarch", "8Base-RHOSE-4.9:python3-pyperclip-0:1.6.4-6.el8ost.noarch", "8Base-RHOSE-4.9:python3-scciclient-0:0.9.1-0.20210720102209.34ccd96.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-oem-idrac-tests-0:2.0.1-0.20210326153413.83b7eb0.el8.noarch", "8Base-RHOSE-4.9:python3-sushy-tests-0:3.11.0-0.20210802160404.b93dcba.el8.noarch", "8Base-RHOSE-4.9:python3-wcwidth-0:0.1.7-14.el8ost.noarch", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.aarch64", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.ppc64le", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.s390x", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.src", "8Base-RHOSE-4.9:redhat-release-coreos-0:49.84-2.el8.x86_64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.src", "8Base-RHOSE-4.9:runc-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debuginfo-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.aarch64", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.ppc64le", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.s390x", "8Base-RHOSE-4.9:runc-debugsource-0:1.0.1-2.rhaos4.9.git4144b63.el8.x86_64", "8Base-RHOSE-4.9:rust-afterburn-0:5.1.0-1.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.ppc64le", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.s390x", "8Base-RHOSE-4.9:rust-afterburn-debugsource-0:5.1.0-1.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:rust-bootupd-0:0.2.5-3.rhaos4.9.el8.src", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.aarch64", "8Base-RHOSE-4.9:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.9.el8.x86_64", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.noarch", "8Base-RHOSE-4.9:toolbox-0:0.0.8-3.rhaos4.9.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36980" }, { "category": "external", "summary": "RHBZ#1984473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36980", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36980" }, { "category": "external", "summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851", "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851" } ], "release_date": "2021-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:network-scripts-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.src", "8Base-RHOSE-4.9:openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-debugsource-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-devel-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:openvswitch2.15-ipsec-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:openvswitch2.15-test-0:2.15.0-28.el8fdp.noarch", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-0:2.15.0-28.el8fdp.x86_64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.aarch64", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.ppc64le", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.s390x", "8Base-RHOSE-4.9:python3-openvswitch2.15-debuginfo-0:2.15.0-28.el8fdp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action" } ] }
rhsa-2021_3361
Vulnerability from csaf_redhat
Published
2021-08-31 08:09
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.1 security and bug fix update
Notes
Topic
An update is now available for the Migration Toolkit for Containers (MTC) 1.5.1.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security fixes:
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for the Migration Toolkit for Containers (MTC) 1.5.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate\nKubernetes resources, persistent volume data, and internal container images\nbetween OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity fixes:\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3361", "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1996125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3361.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.1 security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:19:35+00:00", "generator": { "date": "2024-09-18T04:19:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3361", "initial_release_date": "2021-08-31T08:09:25+00:00", "revision_history": [ { "date": "2021-08-31T08:09:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-31T08:09:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.5", "product": { "name": "8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.5::el8" } } }, { "category": "product_name", "name": "7Server-RHMTC-1.5", "product": { "name": "7Server-RHMTC-1.5", "product_id": "7Server-RHMTC-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.5::el7" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "product": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.5.1-13" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.5.1-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.5.1-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.5.1-22" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.5.1-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "product": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.5.1-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.5.1-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "product": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "product": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.5.1-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64 as a component of 7Server-RHMTC-1.5", "product_id": "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "relates_to_product_reference": "7Server-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64" }, "product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" }, "product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3556
Vulnerability from csaf_redhat
Published
2021-09-16 18:38
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.17.0
Notes
Topic
Release of OpenShift Serverless 1.17.0
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Red Hat OpenShift Serverless 1.17.0 release of the OpenShift Serverless
Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7 and 4.8, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.
Security Fix(es):
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
It was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless client kn 1.16.0. This has been fixed (CVE-2021-3703).
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.17.0\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless 1.17.0 release of the OpenShift Serverless\nOperator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7 and 4.8, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\nIt was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless client kn 1.16.0. This has been fixed (CVE-2021-3703).\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3556", "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983651" }, { "category": "external", "summary": "1983654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983654" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3556.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.17.0", "tracking": { "current_release_date": "2024-09-18T04:20:08+00:00", "generator": { "date": "2024-09-18T04:20:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3556", "initial_release_date": "2021-09-16T18:38:06+00:00", "revision_history": [ { "date": "2021-09-16T18:38:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-16T18:38:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.17", "product": { "name": "Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.17::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.23.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.23.2-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.23.1-2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.23.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.23.2-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.17.0-11" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.23.1-2" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.23.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.23.2-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.23.1-2" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3703", "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992955" } ], "notes": [ { "category": "description", "text": "CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed for Serverless 1.16.0 and Serverless client kn 1.16.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw is moderate as the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 are moderate. The score is assigned as per the highest score given in CVE-2021-27918 and CVE-2021-33196.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3703" }, { "category": "external", "summary": "RHBZ#1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3703", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3703" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703" } ], "release_date": "2021-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196" }, { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_2634
Vulnerability from csaf_redhat
Published
2021-07-01 17:19
Modified
2024-09-18 04:18
Summary
Red Hat Security Advisory: go-toolset-1.15 and go-toolset-1.15-golang security and bug fix update
Notes
Topic
An update for go-toolset-1.15 and go-toolset-1.15-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: archive/zip: Malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Memory consumption (container_memory_rss) steadily growing for /system.slice/kubelet.service when FIPS enabled [devtools-2021.2-z] (BZ#1975394)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.15 and go-toolset-1.15-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Memory consumption (container_memory_rss) steadily growing for /system.slice/kubelet.service when FIPS enabled [devtools-2021.2-z] (BZ#1975394)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2634", "url": "https://access.redhat.com/errata/RHSA-2021:2634" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset", "url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_2634.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.15 and go-toolset-1.15-golang security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:18:46+00:00", "generator": { "date": "2024-09-18T04:18:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:2634", "initial_release_date": "2021-07-01T17:19:15+00:00", "revision_history": [ { "date": "2021-07-01T17:19:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-07-01T17:19:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:18:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2021" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2021" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "product": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "product_id": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.13-1.el7_9?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.15-0:1.15.13-1.el7_9.src", "product": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.src", "product_id": "go-toolset-1.15-0:1.15.13-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15@1.15.13-1.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-race@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-build@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-runtime@1.15.13-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "product": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "product_id": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-scldevel@1.15.13-1.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-build@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-runtime@1.15.13-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "product": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "product_id": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-scldevel@1.15.13-1.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-build@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-runtime@1.15.13-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "product_id": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-scldevel@1.15.13-1.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "product": { "name": "go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "product_id": "go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-docs@1.15.13-1.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.src", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch" }, "product_reference": "go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.src", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch" }, "product_reference": "go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x" }, "product_reference": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2634" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-build-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.13-1.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-runtime-0:1.15.13-1.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-scldevel-0:1.15.13-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" } ] }
rhsa-2021_2704
Vulnerability from csaf_redhat
Published
2021-07-13 16:56
Modified
2024-09-18 04:18
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.16.0
Notes
Topic
Release of OpenShift Serverless Client kn 1.16.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Serverless Client kn 1.16.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.16.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Client kn 1.16.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless Client kn 1.16.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.16.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2704", "url": "https://access.redhat.com/errata/RHSA-2021:2704" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1971449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971449" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_2704.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.16.0", "tracking": { "current_release_date": "2024-09-18T04:18:52+00:00", "generator": { "date": "2024-09-18T04:18:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:2704", "initial_release_date": "2021-07-13T16:56:14+00:00", "revision_history": [ { "date": "2021-07-13T16:56:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-07-13T16:56:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:18:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.0", "product": { "name": "Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.22.0-3.el8.src", "product": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.src", "product_id": "openshift-serverless-clients-0:0.22.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.22.0-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.22.0-3.el8.x86_64", "product": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.x86_64", "product_id": "openshift-serverless-clients-0:0.22.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.22.0-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "product": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "product_id": "openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.22.0-3.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.22.0-3.el8.s390x", "product": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.s390x", "product_id": "openshift-serverless-clients-0:0.22.0-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.22.0-3.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le" }, "product_reference": "openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.s390x as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x" }, "product_reference": "openshift-serverless-clients-0:0.22.0-3.el8.s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.src as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src" }, "product_reference": "openshift-serverless-clients-0:0.22.0-3.el8.src", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.22.0-3.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" }, "product_reference": "openshift-serverless-clients-0:0.22.0-3.el8.x86_64", "relates_to_product_reference": "8Base-Openshift-Serverless-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index\n\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index\n\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index\n\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.22.0-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" } ] }
rhsa-2021_2984
Vulnerability from csaf_redhat
Published
2021-08-10 07:52
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.8.4 bug fix and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.8.4 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.4. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2021:2983
Security Fix(es):
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: archive/zip: Malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.8.4 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.4. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:2983\n\nSecurity Fix(es):\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: archive/zip: Malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2984", "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1988945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988945" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_2984.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.8.4 bug fix and security update", "tracking": { "current_release_date": "2024-09-18T04:19:21+00:00", "generator": { "date": "2024-09-18T04:19:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:2984", "initial_release_date": "2021-08-10T07:52:56+00:00", "revision_history": [ { "date": "2021-08-10T07:52:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-10T07:52:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "product": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "product_id": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "product": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "product_id": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_id": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_id": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3229
Vulnerability from csaf_redhat
Published
2021-08-19 12:33
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.5 security update
Notes
Topic
An update is now available for Red Hat OpenShift Jaeger 1.20.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project,
tailored for installation into an on-premise OpenShift Container Platform
installation.
Security Fix(es):
* golang: net: lookup functions may return invalid host names
(CVE-2021-33195)
* golang: archive/zip: Malformed archive may cause panic or memory
exhaustion (CVE-2021-33196)
* golang: net/http/httputil: ReverseProxy forwards connection headers if
first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error
if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to
panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Jaeger 1.20.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Jaeger is Red Hat\u0027s distribution of the Jaeger project,\ntailored for installation into an on-premise OpenShift Container Platform\ninstallation.\n\nSecurity Fix(es):\n\n* golang: net: lookup functions may return invalid host names\n(CVE-2021-33195)\n\n* golang: archive/zip: Malformed archive may cause panic or memory\nexhaustion (CVE-2021-33196)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if\nfirst one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error\nif passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to\npanic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3229", "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "TRACING-2083", "url": "https://issues.redhat.com/browse/TRACING-2083" }, { "category": "external", "summary": "TRACING-2087", "url": "https://issues.redhat.com/browse/TRACING-2087" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3229.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.5 security update", "tracking": { "current_release_date": "2024-09-18T04:20:00+00:00", "generator": { "date": "2024-09-18T04:20:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3229", "initial_release_date": "2021-08-19T12:33:40+00:00", "revision_history": [ { "date": "2021-08-19T12:33:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-19T12:33:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Jaeger 1.20", "product": { "name": "Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20", "product_identification_helper": { "cpe": "cpe:/a:redhat:jaeger:1.20::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Jaeger" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.5-5" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.5-8" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.5-4" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.5-5" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.5-5" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.5-8" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.5-4" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.5-5" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.5-5" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.5-8" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.5-4" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.5-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3555
Vulnerability from csaf_redhat
Published
2021-09-16 15:24
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.17.0
Notes
Topic
Release of OpenShift Serverless Client kn 1.17.0
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Red Hat OpenShift Serverless Client kn 1.17.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.17.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
* serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196 (CVE-2021-3703)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Client kn 1.17.0\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless Client kn 1.17.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.17.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196 (CVE-2021-3703)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3555", "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983656" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3555.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.17.0", "tracking": { "current_release_date": "2024-09-18T04:20:01+00:00", "generator": { "date": "2024-09-18T04:20:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3555", "initial_release_date": "2021-09-16T15:24:35+00:00", "revision_history": [ { "date": "2021-09-16T15:24:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-16T15:24:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.0", "product": { "name": "Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.src", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.src", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.s390x as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.src as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.src", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "relates_to_product_reference": "8Base-Openshift-Serverless-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3703", "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992955" } ], "notes": [ { "category": "description", "text": "CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed for Serverless 1.16.0 and Serverless client kn 1.16.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw is moderate as the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 are moderate. The score is assigned as per the highest score given in CVE-2021-27918 and CVE-2021-33196.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3703" }, { "category": "external", "summary": "RHBZ#1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3703", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3703" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703" } ], "release_date": "2021-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196" }, { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_2705
Vulnerability from csaf_redhat
Published
2021-07-13 21:41
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.16.0
Notes
Topic
Release of OpenShift Serverless 1.16.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Serverless 1.16.0 release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.
Security Fix(es):
* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.16.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless 1.16.0 release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2705", "url": "https://access.redhat.com/errata/RHSA-2021:2705" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1971445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971445" }, { "category": "external", "summary": "1971448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971448" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_2705.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.16.0", "tracking": { "current_release_date": "2024-09-18T04:19:00+00:00", "generator": { "date": "2024-09-18T04:19:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:2705", "initial_release_date": "2021-07-13T21:41:53+00:00", "revision_history": [ { "date": "2021-07-13T21:41:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-07-13T21:41:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.16", "product": { "name": "Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.16::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.22.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.16.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.16.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.22.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.22.0-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.22.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.16.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.22.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.22.0-3" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.22.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.16.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.22.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.16.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.22.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.22.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.22.0-3" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64 as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le as a component of Red Hat OpenShift Serverless 1.16", "product_id": "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.16" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index\n\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2705" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index\n\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2705" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index\n\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2705" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:62c9ccb7831c988faf89dbf2029624b82a2884b5bebcb6e7cbec6b9e70f64706_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:7a0e0d72b6d6e230f12c925ed15955a91465a96e9571e997580ca05febf0e348_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/client-kn-rhel8@sha256:dc8ac0327c5d449b78fa0cbc7d530615bfd8ccaa5088a9a5773c8b563fcbbbb0_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:1958b772192cac8157250fbb30943f6ccf104bde5e3ee681e303c331abc12485_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:7919210c38d4e684b66826f9ac97b4d46ca3877ad4d0c14ed75408b1f8d5299f_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:c544198394e26287e8ccfa730d3d08fbd553a6a3ec9de50ebeeab76fc1746ad3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:356a15345f3473c2361d2be1f9bff8d79d09d4eb1024cb8de7cae98df855e69c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:5edfa95b4adaf5bebda75b9a01b33ea1b9f170a8a4225f9045aae30d33f5e21c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-controller-rhel8@sha256:a9935e0489acece6bc478c39feaaaf5fd1b422fc48abbb0c434f8d9d2576877e_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:56d9ec76de86392020e187e6650e4763175f3421ebbcafe6d3f28b50aa12dc52_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:90621924813d8876acdbbad612cf824660ff1146cc0c02cd0ef837fd7b8325a2_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:9c35e4c1c7f75433fe86d5ed50882b8fbf726e938933a0cb9235e1f037302ee2_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1a560c4a70d3b4fbbfcbe956cc732272fc6f438511aa7c1f7eec7f79daf55cd6_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1f02f779e5318a9aac0904855250191c96a8ebb1f1ed0d764d99a4b6d53569d6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:bfedff56d61f7f55260ee3023ccc04a2b0ffcb5bd92b1221f325f922c86618bf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:5e69237ad7b367daaef8d1709eeb1b5ec882cba23c856dfdda8d31aaa239a745_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:6a8eb41e321fc5225352bde8afbb1f05670d182e72ca74c497f5cfcf1d13ef8b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:c4090785e32de9f3b374652324fef78379c23774fac538c0ec958ac38daa8b58_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:0d6439505d115a57adedf117304db8421433ff90a89eaac4623a4d458b9adbef_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d1dafbc85819555d64789d53d7d8df385f7751011734152f2dbd09e08209e866_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ff7bf6f39dd8dd52aa4f6b9ffafde6046261125cf77311f59e50c9c04a3f0a9c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:44a54d8ef641ebc5e5d2dd767f6d1df9ad5739d13a82505c822f3e30513822db_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:c4019a4ecc73872d421bf4fb7025892e2e564e3426e1037ec5f897a8b9eb21ff_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:dc737ab3465529879e56f1d05226028ae784399d18cad59463830462deec8ed1_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:11150afaf98cd4ea20bbcb81762709e71c93a435f3b6e8b08b5cf9c09a4fb68b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:2a057386f641d16a0f5ac736887ffce06eb645e4f6c4ce8e088af07be5f8e28d_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-mtping-rhel8@sha256:ecdf701499d23f0cb3aefa5e9bf590c90b809da53adc7dd60cdced30986d5478_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:34303a5cbbd0e91d2a16b2783f4b43c9eed1f90287df92aca01b7e56da43cc4c_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8485b4d234cba2bb967ca2f32b35b838155f56858ab3d0b736256cead0129e35_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8af8882fb6e08283998ba11807174216a109e4056bfdf90dab51b2a79a649a19_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:004ce15b1680d1ba7dda5f321bd66f52b0938e13efef32fbdcbb4c6a2e2227a6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:4216b1d4106a68b90b73a0d176527497212f7440c912291c44602551a0ad110a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:a62f1428a4649813db23ced5d0307981efd346311473965cb9095a31ecb8ca98_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:152f331fe988ee24cfcf4a4dd924efaadb9da3558cfc00f44bbd3430c65c61a3_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:40c4d54de5a55ea7407b19cdb985588dab2d374b48ab1232fc8e2b713ad702a5_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/eventing-webhook-rhel8@sha256:ac57ab10541c199db2c06aca4235157f02c7ad64ddb1126ed9b448feb6104ae3_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:16050548a2fb0293dde41dda3fa952a9938d8af1b1b0da6e46b8cf5de99093be_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:263fcd37932877183b28db7914df71a6c93af18adad3705258b6468e7e370ac6_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/ingress-rhel8-operator@sha256:c2b6c2cb039a9e3eb4432041c46e8052e7893cdc9555e8cb8ff5cdadef2c5e57_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:956c1c43472d5befe77bf372f3a421c986c899aaecf43d3db0df09e6405a8ae1_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:9eccc9772309a9ca3aaa196bc527d17ae13ec7273b4957d958d019163e9a36c0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:ea8b54826fb158a89865c23e3b438ee67ad4266bf575eda426cb0ce84441bb37_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:4c80e1d9211575d9b270637a8266d665408ee9134782d7afe72a27202c99126a_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:8fed78abd4ac909c61520089409bdc8cedba431c96829b3c1ab2bba4c9b1e74c_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/knative-rhel8-operator@sha256:e78bc3a8109979984348b8eb2842f7b00c95657f6ed226ba3e5ba7de702d98ad_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:12610493609c2c7bc45344bba0fafdb7fb7be3675213af8f01ed529de79f172a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:164d9a395835ba419866acf959dcbe0cdba718e9f80848e6da28c06ec11176f6_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/kourier-control-rhel8@sha256:be5cc34d8e1c9a85945aa930021901d488e50d27c647d583ba85bac621cc1cbe_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:60f4f8600a06483289d97c9228844d3fea84b79263cd4361113f858425870995_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:a2c0c74cac2741ed4b187a30399cf6500c8d5dc66ee60d646af5c643972fd5bf_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-controller-rhel8@sha256:db9dfc01276a16c59bdf3671262e1c1db03ec3edfdd86b6dcfab9605fae5ba33_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:48492cdff1033a64ce6fb268b78d5abdf064036ea6976889754c5c0ce0b56859_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a691e39d22a1e257943a5743fd71555eb38f0cab94ae929bb8191e7b035bea2f_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b8bf79102c15f05be93efd996d54f24b0393c61cd5a66c2c0f6b75214997cf89_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-operator-bundle@sha256:45419a1e5f451a457a763e8767873595bf1977aee9ee69b5a15eaade90faf0d0_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:0ead0cc1806cb7d4824f67fd06829773b933a43bc823dd1770f8fd745b03d968_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:50b050172d484da11dc0c317b328a798d5a8f088cfda876dc1d2e335030f4938_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serverless-rhel8-operator@sha256:d6825c498b3661c097bd946f402eb3fbf9aedbc1b52fa099d0d92b8307d4690b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:397eeb294c009c99e810555876bcd27d24c70aee52978ed838bc68ff3a6b0f8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:81c5483bd8c248b6b4fb9dbeb24ddf12496531774332a3c6b33f34471713fb53_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-activator-rhel8@sha256:9037fec0b9915bdbf11efbde6e2dd0af4604e204f1554f44aa082aa970b78868_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:0a3f9d8474b78fe867dfcbca13c21fd8b41bb63372b6a4ebd3cfc65995a8f207_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:676fb8528b1b442775868d375bb90f89906763693f4aff6568ebd6c99ebe6e70_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:80ae260bcfc58cff4113a88d789557c0a96dab6fbf5984a9c4b840efb010092c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:7b495472669242f9492d1743473f064525f6ef6320d2de5a27de447a5f3c3fce_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:b3453234fe414a73f2c4d53fefa785fb79fe5647e3340f7b15d4a1f271ab7d8d_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-autoscaler-rhel8@sha256:e24a5b56a311fa5d2fa201c2a51b4ad53e1b70ab1e11189cff7eb35933bea289_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:a24e1b4ca40d394065b7d018089de285fb5ab09228f84af3049f98d6ed740db5_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:b5079ee10f5d18e0818b1951f6bfac4acce2d24b4e2b1af8097dae765c4b7950_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-controller-rhel8@sha256:f32b2d04db548a53374fc9b708ef9c151d7e673b06e811231db25113a9175457_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:62b6bee16f5ad365c3e87b190855f8697c12e5dfe8a70c908a3345fbadd72540_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:98d9bc011904f9ec6c7ba02effa9259baab3ecb3e31753af56d51e8086a9d900_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:ad51d53d099fcb502857a05b72fe63c9540f19f3f9eb6b4e117343054a0f0f71_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:608e5a5dd723e379d92cb1584fcccb2b712c47a8491f0874a618d610db539bf4_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8db5fc0b74f85cc51c2ad869dd2bff3248c7044e2015101649ecda7f995b734b_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f65aa9bc1f1f885297dd52cd095726e76f0e75984e650181d81ff040e6800717_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:562e64503d96ec5715d4b9dc479885a13f2cfa987bc022b293bdf8726fa00a6a_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:dc610c3c175b4634b6b85c0d3dc7364856f22bda5540468543641aaed4ec9c9f_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-queue-rhel8@sha256:e5f6b1d33b7700ff42928bab45927dffdb993600b33205dd8cbf42d84f7e907c_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1416c5c4a579f5d169dcb0a006580dc574ddd9eeacc145b1d0069bf94130bead_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:70d4d795e7c883a412f319cf78aef9c080d78d340520c2948193d95cec45500b_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:ab3514a73870a208855823497485cf4ac67c1fe3dd94f24bc0a0e12c30ea4387_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:2cf4d5aae44791dfab21f77ba9c6b349b94b458526e361b1f1fc1715277d60af_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:7b5771038dad92c2608bc355c0267670bf4abbe44b2de602617708444e932b25_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/serving-webhook-rhel8@sha256:87e8cdea01d415bae6a5aaa201648ea18268db934e884d33ef66af38eef38537_ppc64le", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:1ecc8287f0b7943b6db606145f137c0f7a961e4371216dd7e97fdaff105617cf_s390x", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:bb49477b7e54a534d1a6f7aaa007a893481d6b7902f7c1612dca50c8205dd214_amd64", "8Base-Openshift-Serverless-1.16:openshift-serverless-1/svls-must-gather-rhel8@sha256:e1fc67c5720e9410d6c3d16ed815a779d2fc2cfeb02b95ce9f54cd115847fc4b_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" } ] }
rhsa-2021_3076
Vulnerability from csaf_redhat
Published
2021-08-10 16:13
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The following packages have been upgraded to a later upstream version: golang (1.15.14). (BZ#1982287)
Security Fix(es):
* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* FIPS mode AES CBC CryptBlocks incorrectly re-initializes IV in file crypto/internal/boring/aes.go (BZ#1978567)
* FIPS mode AES CBC Decrypter produces incorrect result (BZ#1983976)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nThe following packages have been upgraded to a later upstream version: golang (1.15.14). (BZ#1982287)\n\nSecurity Fix(es):\n\n* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* FIPS mode AES CBC CryptBlocks incorrectly re-initializes IV in file crypto/internal/boring/aes.go (BZ#1978567)\n\n* FIPS mode AES CBC Decrypter produces incorrect result (BZ#1983976)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3076", "url": "https://access.redhat.com/errata/RHSA-2021:3076" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset", "url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.15.7_toolset" }, { "category": "external", "summary": "1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1978567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978567" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3076.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:19:28+00:00", "generator": { "date": "2024-09-18T04:19:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3076", "initial_release_date": "2021-08-10T16:13:22+00:00", "revision_history": [ { "date": "2021-08-10T16:13:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-10T16:13:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8040020210716085908:5081a262", "product": { "name": "go-toolset:rhel8:8040020210716085908:5081a262", "product_id": "go-toolset:rhel8:8040020210716085908:5081a262", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8040020210716085908:5081a262" } } }, { "category": "product_version", "name": "golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product": { "name": "golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_id": "golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product": { "name": "golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_id": "golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product": { "name": "golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_id": "golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product": { "name": "golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_id": "golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product_id": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product_id": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product_id": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "product": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "product_id": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "product": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "product_id": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=src" } } }, { "category": "product_version", "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "product": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product_id": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product_id": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product_id": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product_id": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product_id": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product_id": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_id": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product": { "name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_id": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product": { "name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_id": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.5.0-2.module%2Bel8.4.0%2B8864%2B58b0fcdb?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_id": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_id": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_id": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product": { "name": "golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_id": "golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.15.14-1.module%2Bel8.4.0%2B11833%2B614b07b8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, "product_reference": "go-toolset:rhel8:8040020210716085908:5081a262", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src" }, "product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64" }, "product_reference": "delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64" }, "product_reference": "delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64" }, "product_reference": "delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64" }, "product_reference": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le" }, "product_reference": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x" }, "product_reference": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src" }, "product_reference": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64" }, "product_reference": "go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64" }, "product_reference": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le" }, "product_reference": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x" }, "product_reference": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src" }, "product_reference": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64" }, "product_reference": "golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64" }, "product_reference": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le" }, "product_reference": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x" }, "product_reference": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64" }, "product_reference": "golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" }, "product_reference": "golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" }, "product_reference": "golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64 as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64" }, "product_reference": "golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" }, "product_reference": "golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch as a component of go-toolset:rhel8:8040020210716085908:5081a262 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" }, "product_reference": "golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3076" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3076" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3076" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3076" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debuginfo-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:delve-debugsource-0:1.5.0-2.module+el8.4.0+8864+58b0fcdb.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:go-toolset-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.src", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.s390x", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-bin-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-docs-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-misc-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-race-0:1.15.14-1.module+el8.4.0+11833+614b07b8.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-src-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch", "AppStream-8.4.0.Z.MAIN.EUS:go-toolset:rhel8:8040020210716085908:5081a262:golang-tests-0:1.15.14-1.module+el8.4.0+11833+614b07b8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
ghsa-6r28-26q2-vxwj
Vulnerability from github
Published
2022-05-24 19:09
Modified
2022-07-13 00:01
Severity
Details
Go before 1.15.12 and 1.16.x before 1.16.5 attempts to allocate excessive memory (issue 1 of 2).
{ "affected": [], "aliases": [ "CVE-2021-33196" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-400" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-02T19:15:00Z", "severity": "HIGH" }, "details": "Go before 1.15.12 and 1.16.x before 1.16.5 attempts to allocate excessive memory (issue 1 of 2).", "id": "GHSA-6r28-26q2-vxwj", "modified": "2022-07-13T00:01:25Z", "published": "2022-05-24T19:09:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-02" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
gsd-2021-33196
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-33196", "description": "In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic.", "id": "GSD-2021-33196", "references": [ "https://www.suse.com/security/cve/CVE-2021-33196.html", "https://access.redhat.com/errata/RHSA-2021:3758", "https://access.redhat.com/errata/RHSA-2021:3556", "https://access.redhat.com/errata/RHSA-2021:3555", "https://access.redhat.com/errata/RHSA-2021:3361", "https://access.redhat.com/errata/RHSA-2021:3229", "https://access.redhat.com/errata/RHSA-2021:3076", "https://access.redhat.com/errata/RHSA-2021:2984", "https://access.redhat.com/errata/RHSA-2021:2983", "https://access.redhat.com/errata/RHSA-2021:2705", "https://access.redhat.com/errata/RHSA-2021:2704", "https://access.redhat.com/errata/RHSA-2021:2634", "https://advisories.mageia.org/CVE-2021-33196.html", "https://security.archlinux.org/CVE-2021-33196", "https://linux.oracle.com/cve/CVE-2021-33196.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-33196" ], "details": "In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic.", "id": "GSD-2021-33196", "modified": "2023-12-13T01:23:18.186283Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce" }, { "name": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.16.5", "versionStartIncluding": "1.16.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.15.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33196" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "https://groups.google.com/g/golang-announce", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00017.html" }, { "name": "[debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00016.html" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-04-20T00:15Z", "publishedDate": "2021-08-02T19:15Z" } } }
Loading...